System Analysis & Design - Chapter 6
Relationship
(diamond or line) shows the association between two entities, has a parent entity and a child entity; is described with a verb phrase; has cardinality; has modality; is dependent or independent
Attribute
(oval or square) is a property of an entity; should be used by at least one business process; is broken down to its most useful level of detail
Transport Layer Security (TLS)
an Internet standard equivalent to SSL
IP Security (IPSec)
an Internet standard for secure transmission of low-level network packets
Hypertext Transfer Protocol Secure (HTTPS)
an Internet standard for securely transmitting Web pages
Transport Layer Security (TLS)
an advanced version of Secure Sockets Layer (SSL) protocol used to transmit information over the Internet securely
Hypertext Transfer Protocol Secure (HTTPS)
an encrypted form of information transfer on the Internet that combines HTTP and TLS
asymmetric key encryption
an encryption method that uses different keys to encrypt and decrypt data
symmetric key encryption
an encryption method that uses the same key to encrypt and decrypt the data
Deliverable
an end product of an SDLC phase
cloud computing
an extension of virtual servers in which the resources available include computing, storage, and Internet access and appear to have unlimited availability
Prototyping
an information-gathering technique useful in seeking: - User reactions - Suggestions - Innovations - Revision plans
digital certificate
an institution's name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party
Repository
an integrated and standard database which is the common method for providing product and tool integration - also known as project dictionary or workbook
Prototyping
an iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between an analyst and users
Rational Unified Process (RUP)
an object oriented systems development methodology. Establishes four phases of development: inception, elaboration, construction, and transition. Each phase is organized into a number of separate iterations
Project workbook
an online or hard-copy repository for all project correspondence, inputs, outputs, deliverables, procedures, and standards that is used for performing project audits, orienting new team members, communicating with management and customers, identifying future projects, and performing post-project reviews (diagrams, charts, system descriptions)
Project identification and selection
an organization determines whether resources should be devoted to the development or enhancement of each system under consideration
Resources
any person, group of people, piece of equipment, or material used in accomplishing an activity
An object has certain ____, like the make, model, and color of a car.
attributes
If ____ are similar to adjectives that describe the characteristics of an object, objects are similar to nouns
attributes
The number of ____ needed to describe an object depends on the business requirements of the information system and its users.
attributes
architectural design
broad design of the overall system structure; also called general design or conceptual design
Prototyping
build a prototype that can be modified before the actual system is installed
Duration
calender time to complete a task
A(n) ____ is a group of similar objects.
class
Information system
collection of hardware, software, people, procedures, data, and the Internet
Iteration
completing a full systems development life cycle
Information Systems Analysis and Design
complex organizational process whereby computer based information systems are developed and maintained
Methodologies
comprehensive, multi-step approaches to systems development that will guide work and influence the quality of the final information system that are consistent with its general management style of a organization
CASE tools
computer aided software engineering tools - software tools that provide automated support for some portion of the systems development process
Design Activity Inputs
consist of the models that were built during analysis
value limit controls
controls that check numeric data input to ensure that the value is reasonable
completeness controls
controls that ensure that all required data values describing an object or transaction are present
data validation controls
controls that ensure that numeric fields fields that contain codes or identifiers are correct
output controls
controls that ensure that output arrives at the proper destination and is accurate, current, and complete
input controls
controls that prevent invalid or erroneous data from entering the system
security controls
controls that protect the assets of an organization from all threats, with a primary focus on external threats
integrity controls
controls that reject invalid data inputs, prevent unauthorized data outputs, and protect data and programs against accidental or malicious tampering
field combination controls
controls that review combinations of data inputs to ensure that the correct data are entered
Design Activities
correspond to components of the new system -the environment -application components -user interface -database -software classes and models
Phase 1: Preliminary investigation
define the problem, suggest alternative systems, prepare a short report
In order to reduce the number of joins that must be performed in a query and to increase the speed of data access, the data analyst will ___ the physical model.
denormalize
Phase 3: Systems Design
design alternative systems (economic feasibility, technical feasibility, and operational feasibility), select the best system, write systems design report
Types of Conversion:
direct approach, parallel approach, pilot approach, and phased approach
An ___ is less expensive and easier for novice users to use, but it does not have the features that are necessary to support mission-critical or large scale systems.
end-user database management system
An ___ can support large volumes of data and support applications that run an entire company.
enterprise database management system
What do you consider when identifying and selecting IS development projects?
existing and available resources, perceived and real needs, list of potential and ongoing projects, current organizational environment, evaluation criteria
If the data model does not have any repeating fields it is in ___.
first normal form
Phase 2: Systems analysis
gather data, analyze data, and document systems analysis (systems analysis report)
Interviewing groups:
in a group interview several key people are interviewed at once make sure all of the important people are interviewed
Slack time
includes nodes that are not on the critical path, that can be delayed without delaying the final completion of the project, that allow the project manager some flexibility in scheduling
Ad Hoc approach
individuals are free to find and develop reusable assets on their own
In an object-oriented system, objects can ____ certain attributes from other objects
inherit
A(n) ____ is a specific member of a class.
instance
Your red Mustang is a(n) ____ of the CAR class.
instance
To improve the access speed of a database, similar records in a table are stored together in primary key order. This optimizing access speed process is called ___.
intrafile clustering
Rapid Applications Development (RAD)
involves the use of powerful development software, small specialized teams, and highly trained personal
Application Component
is a well defined unit of software that performs some functions
Application software
is computer software designed to support specific organizational functions and processes (inventory management, payroll, market analysis) an important result of systems analysis and design
JAD:
joint application design; A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements.
Closed-ended questions
like objective questions on an examination, can follow several forms, including the following choices: • True or false. • Multiple choice (with only one response or selecting all relevant choices). • Rating a response or idea on a scale, say from bad to good or strongly agree to strongly disagree. Each point on the scale should have a clear and consistent meaning to each person, and there is usually a neutral point in the middle of the scale. • Ranking items in order of importance.
detail design
low-level design that includes the design of the specific program details
M:N
many entity can refer
Not Null
means that an instance in the related entity must exist for an instance in another entity to be valid
Null
means that no instance in the related entity is necessary for an instance in another entity to be valid
A ____ is a command that tells an object to perform a certain method.
message
A(n) ____ defines specific tasks that an object can perform.
method
Your car performs a(n) ____ called OPERATE WIPERS when you send a message by moving the proper control.
method
Symmetric Key Encryption
method that uses the same key to encrypt and decrypt
An object's ____ are the tasks or functions the object performs.
methods
A major advantage of O-O designs is that systems analysts can save time and avoid errors by using ____ objects.
modular
Software
most obvious end product of the SDLC
Pilot approach
new system is tired out in only one part of the organization
Null
no instance in one entity has to exist for the other to exist
• Good systems analyst characteristics:
o Impertinence- questioning everything o Impartiality- consider all issues to find the best organizational solution o Relax contraints- assume anything is possible o Reframing- challenge yourself to new ways
A(n) ____ represents a real person, place, event, or transaction.
object
The type of database that is most capable of supporting complex data types is ___.
object-oriented DBMS
Content Filtering
occurs when organizations use software that filters content to prevent the transmission of unauthorized information ex. University Email Quarantine
Parallel approach
old and new systems operate side by side (parallel) until new one proves to be reliable
1:1
one entity can only relate to one entity
1:N
one entity can refer to one to many instances in another entity
Not Null
one entity must exist so the other entity can exist
Service Level Agreement (SLA)
part of the contract between a business and a hosting company that guarantees a specific level of system availability
Techniques
particular processes that an analyst will follow to help ensure work is well thought out, complete and comprehensible to others that provide support for a wide range of tasks.
registered users
people who are authorized to access the system
unauthorized users
people who aren't access to any part or function of the system
privileged users
people who have access to the source code, executable program, and database structure of the program
The concept that a message gives different meanings to different objects is called ____.
polymorphism
Close-ended questions
questions in interviews that ask those responding to choose from among a set of specified responses
closed-ended questions
questions in interviews that ask those responding to choose from among a set of specified responses
Open ended questions:
questions in interviews that have no prespecified answers.
The UML represents an object as a(n) ____ with the object name at the top, followed by the object's attributes and methods.
rectangle
The process of ensuring that values linking tables together through the primary and foreign keys are valid and correctly synchronized is ___.
referential integrity
Cardinality
refers to the number of times instances in one entity can be related to instances in another entity
Modality
required or not
A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in ___ normal form.
second
Analysis
second phase of the SDLC in which system requirements are studied and structured. Includes requirements determination and studying the requirements and structure them according to their interrelationships and eliminate redundancies The output of this phase = description of the alternative solution recommended
E)all of the above
selection rules for an identifier: A)choose a candidate key that will not change its value B)chose a candidate key that will never be null C)avoid using intelligent keys D)consider substituting single value surrogate keys for large composite keys E) all of the above
System flowcharts
show the flow of input data to processing and finally to output, or distribution of information
Physical Data Model
shows how the data will actually be stored in databases or files.
Grid charts
shows relationship between output and input documents
Data flow diagram
shows the data flow within an information system
Logical Data Model
shows the organization of data without indicating how it is stored, created, or manipulated.
Tokens
small electronic devices that change user passwords automatically
Automated design tools or CASE (Computer Aided Software Design)
software packages that evaluate hardware and software alternatives according to requirements given by the systems analyst
Objects can have a specific attribute called a(n) ____.
state
The ____ of an object is an adjective that describes the object's current status.
state
A relational database may be optimized for ___.
storage efficiency and speed of access
Which of the following is NOT a characteristic of current object-relational databases?
support for inheritance
Security feasibilty
system criticality, vulnerability, and threat
OOAD
system development methodologies and techniques based on objects rather than data or processes - often called the third approach to systems development, after the process - oriented and data - oriented approaches
Phase 6: Systems Maintenance
systems audit and periodic evaluation
Rapid Application Development (RAD)
systems development methodology created to radically decrease the time needed to design and implement information systems. Relies on extensive user involvement, prototyping, integrated CASE tools, and code generators System developers and end users work together jointly in real time to develop systems
Informational
systems: the way people actually do things
SQL operates on ___.
tables of data at a time
What is required for a task to be considered manageable?
task can be done by one person or group has known method or technique has predecessor and successor steps is measurable (% completed can be determined)
Digital Signature
technique where a document is encrypted using a private key
Disruptive technologies
technologies that enable breaking long-held business rules that inhibit organizations from making radical business changes
Describe the use of metadata
terms that provide structure for data in a structured repository (database)
Total slack time
the amount of time a task can be delayed without delaying the completion of the project
Free slack time
the amount of time a task can be delayed without delaying the early start of any immediately following tasks
server computer
the central computer that provides services (such as database access) to the client computers over a network
client computers
the computers at which the users work to perform their computational tasks
Maintenance
the final phase in the SDLC in which an information system is systematically repaired and improved Make the changes that users ask for and modify the system to reflect changing business conditions
Project Closedown
the final phase of the project management process that focuses on bringing a project to an end (natural or unnatural end)
Planning
the first phase in the SDLC in which an organization's total information system needs are identified, analyzed, prioritized, and arranged.
Project initiation
the first phase of the project management process in which activities are performed to assess the size, scope, and complexity of the project and to establish procedures to support later project activities
Transmission Control Protocol/ Internet Protocol (TCP/IP)
the foundation protocol of the Internet; used to provide reliable delivery of messages between networked computers
Implementation
the fourth phase in the SDLC in which the information system is coded, tested, installed, and supported in the organization. The detailed physical specifications are handed over to programmers. Also includes: initial user support, finalization of documentation, training programs are finalized
Biometrics
the identification of a user based on a physical characteristics, such as a fingerprint, iris, face, voice, or handwriting
Phased approach
the new system is implemented gradually over a period of time (in phases)
Formal system
the official way a system works as described in organizational documentation
business logic layer or domain layer
the part of a three-layer architecture that contains the programs that implement the business rules and processes
data layer
the part of a three-layer architecture that interacts with the data
Logical Design
the part of the design phase of the SDLC in which all functional features of the system chosen for development in analysis are described independently of any computer platform Makes sure the system functions as intended - business aspects of the system
Physical Design
the part of the design phase of the SDLC in which the logical specifications of the systems from logical design are transformed into technology-specific details from which all programming and system construction can be accomplished
view layer
the part of the three-layer architecture that contains the user interface
Scribe
the person who makes the detailed notes of the happenings at a Joint Application Design session
Outsourcing
the practice of turning over responsibility for some to all of an organization's information systems applications and operations to an outside firm
Hypertext Markup Language (HTML)
the predominant language for constructing Web pages and which consists of tags and rules about how to display pages
Normalization
the process analysts use to validate data models.
authorization
the process of allowing or restricting a specific authenticated user's access to a specific resource based on an access control list
encryption
the process of altering data so unauthorized users can't view them
value chain analysis
the process of analyzing an organization's activities to determine where value is added to products and/or services and the costs incurred for doing so
decryption
the process of concerting encrypted data back to their original state
Work Breakdown Structure
the process of dividing the project into manageable tasks and logically ordering them to ensure a smooth evolution between tasks - some tasks may be performed in parallel, while others must follow a sequential pattern
authentication
the process of identifying users who request access to sensitive resources
System Design
the process of organizing and structuring the components of a system to enable the construction of the new system
hosting
the process of providing physical servers at a secure location and selling those services to other businesses that wish to deploy Web sites
multi factor authentication
the process of using multiple authentication methods for increased reliability
Inheritance
the property that occurs when entity types or object classes are arranged in a hierarchy and each entity type or object class assumes that attributes and methods of its ancestors. Allows new but related classes to be derived from existing classes
Cloud Computing
the provision of computing resources, including applications, over the internet, so customers do not have to invest in the hardware and software needed to run and maintain the resources
Business process reengineering (BPR)
the search for, and implementation of, the radical change in business processes to achieve breakthrough improvements in products and services
Project planning
the second phase of the project management process that focuses on defining clear, discrete activities and the work needed to complete each activity within a single project
Critical Path
the shortest time in which a project can be completed
Key business processes
the structured, measured set of activities designed to produce a specific output for a particular customer or market
Design
the third phase of the SDLC in which the description of the recommended solution is converted into logical and then physical systems specifications
Project execution
the third phase of the project management process in which the plans created in the prior phases (initiation and planning) are put into action, puts the BPP into action, execution occurs primarily during the analysis, design, and implementation phases
JAD session leader
the trained individual who plans and leads Joint Application Design sessions
Resue
the use of previously written software resources, especially objects and components, in new applications
Informal system
the way a system actually works
Optimized Processes
this is a theoretical level in the development organization where the environment drives the process. Efforts can be channeled into improving the process rather than executing it.
Phase 5: Systems Implementation (Conversion)
types of conversion and training
Agile/ Iteration Projects
typically build fewer models, but models are still created
Tools
typically computer programs that make it easy to use and benefit from techniques to faithfully follow the guidelines of the overall development methodology
An ___ is basically an electronic list of information that is stored on a disk.
unordered sequential access file
An ___ occurs when data are stored redundantly in a database and only some of the instances are updated when a change is needed.
update anomaly
Top-down analysis method
used to identify top-level components of complex systems
Object
usually correspond to real things an information system deals with. Is a structure that encapsulates (or packages) attributes and methods that operate on those attributes. Is an abstraction of a real-word thing in which data and processes are placed together to model the structure and behavior of the real-world thing
Directly observing others:
watching others doing their jobs to determine what improvements need to be made to the system as a whole
Application Component
well defined unit of software that performs one or more specific tasks
peer-to-peer connection
when independent computers communicate and share resources without the need of a centralized server computer
certifying authorities
widely accepted issuers of digital certificates
boundary
A ______ class is a class such as a user interface class that is visible from the outside world.
False
A lifeline indicates when a method is executing for a destination object.
False
A timeline on a communication diagram indicates the sequence of the messages.
:Vehicle _______
A vehicle object is denoted with the following label.
Class responsibility collaboration
CRC stands for what?
False
In the design of a complex use case, both a communication diagram and a sequence diagram may be needed.
use case controller
System designers frequently create a class called a ____ that can serve as a collection point for incoming messages.
use case controller
The _________________ pattern is based on a class that helps to decouple the view layer from the business logic layer by receiving all input messages.
colon
When denoting a specific object in a sequence diagram, a ____ serves as the divider between the object name and the specific object identifier.
design class diagram
Which diagram is directly used to identify methods and write programming code for object-oriented systems?
visibility name:type-expression = initial-value{property}
Which of the following is correct UML notation for an attribute in a design class?
Use case specific
____ methods must be included in a design class diagram.
separation of responsibilities
______ ______ ______ is a design principle that recommends segregating classes into separate packages based on primary focus of responsibility.
Dependency relationships
_____________ ____________ are relationships among elements that indicate which elements affect other elements in a system.
The process of determining requirements:
• Impertinence: You should question everything. You need to ask questions such as: Are all transactions processed the same way? Could anyone be charged something other than the standard price? Might we someday want to allow and encourage employees to work for more than one department? • Impartiality: Your role is to find the best solution to a business problem or opportunity. It is not, for example, to find a way to justify the purchase of new hardware or to insist on incorporating what users think they want into the new system requirements. You must consider issues raised by all parties and try to find the best organizational solution. • Relax constraints: Assume that anything is possible and eliminate the infeasible. For example, do not accept this statement: "We've always done it that way, so we have to continue the practice." Traditions are different from rules and policies. Traditions probably started for a good reason but, as the organization and its environment change, they may turn into habits rather than sensible procedures. • Attention to details: Every fact must fit with every other fact. One element out of place means that even the best system will fail at some time. For example, an imprecise definition of who a customer is may mean that you purge customer data when a customer has no active orders, yet these past customers may be vital contacts for future sales. • Reframing: Analysis is, in part, a creative process. You must challenge yourself to look at the organization in new ways. You must consider how each user views his or her requirements. You must be careful not to jump to the following conclusion: "I worked on a system like that once—this new system must work the same way as the one I built before."
Analyzing documents and procedures:
• Problems with existing systems (e.g., missing information or redundant steps) • Opportunities to meet new needs if only certain information or information processing were available (e.g., analysis of sales based on customer type) • Organizational direction that can influence information system requirements (e.g., trying to link customers and suppliers more closely to the organization) • Titles and names of key individuals who have an interest in relevant existing systems (e.g., the name of a sales manager who led a study of buying behavior of key customers) • Values of the organization or individuals who can help determine priorities for different capabilities desired by different users (e.g., maintaining market share even if it means lower short-term profits) • Special information processing circumstances that occur irregularly that may not be identified by any other requirements determination technique (e.g., special handling needed for a few very large-volume customers and that requires use of customized customer ordering procedures) • The reason why current systems are designed as they are, which can suggest features left out of current software, which may now be feasible and more desirable (e.g., data about a customer's purchase of competitors' products were not available when the current system was designed; these data are now available from several sources) • Data, rules for processing data, and principles by which the organization operates that must be enforced by the information system (e.g., each customer is assigned exactly one sales department staff member as a primary contact if the customer has any questions)
Prototyping also has some drawbacks as a tool for requirements determination. These include the following:
• Prototypes have a tendency to avoid creating formal documentation of system requirements, which can then make the system more difficult to develop into a fully working system. • Prototypes can become very idiosyncratic to the initial user and difficult to diffuse or adapt to other potential users. • Prototypes are often built as stand-alone systems, thus ignoring issues of sharing data and interactions with other existing systems, as well as issues with scaling up applications. • Checks in the SDLC are bypassed so that some more subtle, but still important, system requirements might be forgotten (e.g., security, some data entry controls, or standardization of data across systems).
Components of an organization:
• The business objectives that drive what and how work is done • The information people need to do their jobs • The data (definition, volume, size, etc.) handled within the organization to support the jobs • When, how, and by whom or what the data are moved, transformed, and stored • The sequence and other dependencies among different data-handling activities • The rules governing how data are handled and processed • Policies and guidelines that describe the nature of the business and the market and environment in which it operates • Key events affecting data values and when these events occur
Prototyping is most useful for requirements determination when:
• User requirements are not clear or well understood, which is often the case for totally new systems or systems that support decision making • One or a few users and other stakeholders are involved with the system • Possible designs are complex and require concrete form to fully evaluate • Communication problems have existed in the past between users and analysts and both parties want to be sure that system requirements are as specific as possible • Tools (such as form and report generators) and data are readily available to rapidly build working systems
The iterative analysis- design- code- test cycle
• analyze • design • code • test
eXtreme programing planning game:
• exploration: business write a story card; development provides an estimate • commitment: business sorts stories by nessectiy; development sorts stories by risk; business chooses stories for next release • Steering: business reviews process; business and development adjust plan
Deliverables for requirements determination
• from interviews and observations o interview transcripts , observation notes and meeting minutes • From existing written documents o mission and strategy statements, business forms, procedure manuals, job descriptions, training manuals • From computerized sources o joint application design session results, case repositories
Prototyping methodology:
• identify problem • develop prototype • Implement and use prototype • convert to operational system • revise and enhance prototype
Traditional methods for determining requirements:
• interviewing individuals • interviewing groups • observing workers • studying business documents
Requirements determination
• planning • analysis • design • implementation • maintenance
User involvement with prototyping
- Experimenting with the prototype - Giving open reactions to the prototype - Suggesting additions or deletions
Problems with the SDLC
- Extended time required to go through DLC - User requirements change over time
Four types of prototyping
- Patched-up - Nonoperational - First-of-a-series - Selected features
Stressing the user interface
- Prototype is to get users to further articulate their information requirements. - They should be able to see how the prototype will enable them to accomplish their tasks. - The user interface must be well developed enough to enable users to pick up the system quickly - Online, interactive systems using GUI interfaces are ideally suited for prototypes.
Rules for when to stop decomposing your DFD
- When you have reduced each process to a single decision - When each data store represents data about a single entity - When the system user does not care to see any more detail - When every data flow does not need to be split further to show that different data are handled in various ways - When you believe that you have shown each business form or transaction When you believe a separate process is shown of each choice on all lowest-menu options
Prototype Guidelines
- Working in manageable modules - Build the prototype rapidly - Modify prototype in successive iterations - Stress the user interface
Design Models
-is a model building activity -formality of the project will dictate the type, complexity, and depths of the models
Describe the process of normalization
-process used to improve the design of relational databases -From a lower to a higher normal form, these conditions are increasingly stricter and leave less possibility for redundant data
User Interface
-to the user, user interface IS the system -has large impact on user productivity -includes both analysis and design tasks
Managers.
. Managers of the work groups who use the system in question provide insight into new organizational directions, motivations for and organizational impacts of systems, and support for requirements determined during the JAD.
Scrum methodology
1) Product backlog, in which a list is derived from product specifications. 2) Sprint backlog, a dynamically changing list of tasks to be completed in the next sprint. 3) Sprint, a 30-day period in which the development tram transforms the backlog into software that can be demonstrated. 4) Daily scrum, a brief meeting in which communication is the number-one rule. 5) Demo, working software that can be demonstrated to the customer.
Agile principles
1) Satisfy the customer through delivery of working software. 2) Embrace change, even if introduced late in development. 3) Continue to deliver functioning software incrementally and frequently. 4) Encourage customers and analysts to work together daily. 5) Trust motivated individuals to get the job done. 6) Promote face-to-face conversation. 7) Concentrate on getting software to work. 8) Encourage continuous, regular, and sustainable development. 9) Adopt agility with attention to mindful design. 10) Support self-organizing teams. 11) Provide rapid feedback. 12) Encourage quality. 13) Review and adjust behavior occasionally. 14) Adopt simplicity.
6 phases of system analysis and design (systems life cycle)
1) preliminary investigation 2) systems analysis 3) systems design 4) systems development 5) systems implementation 6) systems maintenance
Guidelines for DFD Completeness
1. Completeness 2. Consistency 3. Timing considerations 4. The iterative nature of drawing DFDs 5. Drawing Primitive DFDs
a key task in defining security controls is?
1. Determining which operating system security features will be enabled 2. How they will be configured.
What are the two primary objectives of security controls?
1. Maintain a stable, functioning operating environment for users and application systems (most common security control is firewall) 2. Protect Information and transactions during transmission across insecure environments such as public wireless networks and the internet
Rules for constructing decision tables
1. Name the conditions and the values each condition can assume. 2. Name all possible actions that can occur 3. List all possible rules. 4. Define the actions for each rule. 5. Simplify the decision table.
Significant problem with Symmetric Key Encryption?
1. The sender and receiver use the same key, which must be created and shared securely 2. Security is compromised if the key is transmitted over the same channel as messages encrypted with the key 3. Sharing a key among many users increases the possibility of key theft
List at least three examples of application components
1. Web Sites 2. Java 3. C#
The 80/20 Rule
20 percent of project work consumes 80 percent of time and resources - Project Managers know that 20 percent of the work (the first 10 percent and the last 10 percent) consume 80 percent of your time and resources.
D) all of the above
70) Which of the following documents are useful in understanding possible future system requirements? A) written work procedures B) documents that describe the current information system C) reports generated by current systems D) all of the above
D) all of the above
71) The analysis of documents can help you identify: A) problems with existing systems B) special information processing circumstances that occur irregularly and may not be identified by any other requirements C) the reason why current systems are designed the way they are D) all of the above
Formal systems
: official documented way to do tasks
Close ended questions:
: questions in interviews that ask those responding to choose from among a set of specified responses
Context Diagram
A DFD of the scope of an organizational system that shows they system boundaries, external entities that interact with the system, and the major information that flows between the entities and the system.
A) level-3 diagram
A DFD that is a result of three nested decompositions of a series of subprocesses from a process on a level-0 diagram defines a: A) level-3 diagram B) level-1 diagram C) level-2 diagram D) primitive diagram
D) level-n diagram
A DFD that is the result of n nested decompositions from a process on a level-0 diagram, is called: A) primitive diagram B) level-0 diagram C) context diagram D) level-n diagram
Level-n Diagram
A DFD that is the result of n nested decompositions of a series of sub-processes from a process on a level-0 diagram.
state machine
A UML diagram that shows the life of an object in states and transitions is called a __________.
Protection from variations
A Web based application that integrates HTML code with business logic is said to be in violation of what design principle?
controller
A ____ class acts as a switchboard between the view layer and the domain layer.
digital certificate
A ____ is an institution's name and public key, which is encrypted and certified by a third party.
digital certificate
A ____ is an institution's name and public key, which is encrypted and certified by a third party.
controller
A ______ class is a class that mediates between the outside world and the internal system classes. It often can be considered a switchboard.
integrity
A ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.
access
A ______ control restricts which persons or programs can add, modify or view information.
data access
A _______ ______ class is a class that is used to retrieve data from a database.
persistent
A _______ class is one where its objects exist after the system is turned off.
stereotype
A ________ is a way of categorizing a model element (particularly a class definition). It is usually denoted with guillemets.
access control list
A ____________________ is the list of users who have rights to access the system and data.
access control list
A ____________________ is the list of users who have rights to access the system and data.
Tangible benefit
A benefit derived from the creation of an information system that can be measured in dollars and with certianty
intangible benefit
A benefit derived from the creation of an information system that cannot be easily measured in dollars or with certainty
True
A big part of describing the environment is identifying and defining all the types of computing devices that will be required.
B) has only inputs
A black hole is one that: A) has only inputs B) has only outputs C) has not been exploded to show enough detail D) has insufficient inputs to produce the associated processes
object
A box in a system sequence diagram refers to a what?
CRC cards
A brainstorming technique for designing interactions in use cases by assigning responsibilities and collaborations for classes is called _______ ______ .
B) identifier
A candidate key that has been selected as the unique, identifying characteristic for an entity type is called a(n): A) attribute B) identifier C) secondary key D) gerund
postcondition
A certain set of values or statuses that must exist after a use case completes its processing is called a _______.
precondition
A certain set of values or statuses that must exist before a use case begins is called a _______.
True
A class level attribute applies to all instances of a class.
object responsibility
A class named SaleItem which has methods to calculate its own price is said to have good
True
A class of objects is equivalent to a set of objects.
concrete class
A class that can be instantiated with objects of its type being created is called a ______ _____.
abstract class
A class that can never have objects of its type created is called a ______ ______
very low
A class that is responsible for accessing both the Internet and a database has ____ cohesion.
association
A class that represents a many-to-many association between two other classes is called a ____ class.
A) entity type
A collection of entities that share common properties or characteristics defines: A) entity type B) entity instance C) entity occurrence D) entity collection
Agile modeling
A collection of innovative, user-centered approaches to system development.
encryption algorithm
A complex mathematical transformation that encrypts or decrypts binary data
True
A composite object only exist as part of a whole-part relationship.
C) data store
A computer-based file containing employee information is represented on a data flow diagram as a: A) data flow B) source C) data store D) process
cardinality
A concept that describes how instances of one entity relate to instances of another entity.
Cardinality
A concept that describes how instances of one entity relate to instances of another entity. Described in entity-relationship diagrams by notation that indicates combinations that include zero or one-to-many, one-to-one, and many-to-many.
A) user rule
A concise statement of the business rule to be enforced by the triggering operation refers to: A) user rule B) condition C) action D) event
state
A condition during an object's life when it satisfies some criterion is called a ______.
A) extended entry
A condition that has more than two values is a(n): A) extended entry B) simple entry C) complex entry D) limited entry
value limit
A control that checks the value of a field to ensure that it is within the correct range is a _______ control.
security
A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.
security
A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.
Pair programming
A core practice of the agile approach in which two programmers who choose to work together both do programming, run tests, and talk to one another about ways to efficiently and effectively get the job done.
one-time cost
A cost associated with a project start-up and development or system start-up
Tangible cost
A cost associated with an information system that can be measured in dollars and with certainty
Intangible cost
A cost associated with an information system that cannot be easily measured in terms of dollars or with certainty
Recurring cost
A cost resulting from the ongoing evolution and use of a system
dependency
A dashed arrow represents a _______ relationship in a package diagram.
C) level-0 diagram
A data flow diagram that represents a system's major processes, data flows, and data stores at a high level of detail refers to: A) context diagram B) level-1 diagram C) level-0 diagram D) level-00 diagram
A) statements
A decision table does not include: A) statements B) condition stubs C) action stubs D) rules
B
A decision table is simplified by: A) removing extended entries B) removing any rules with impossible actions C) removing simple entries D) removing any rules with static actions
use case description
A description in UML that documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks required for successful completion, and other key descriptions and assumptions.
attribute
A descriptive piece of information about a thing or object is called a _______.
object responsibility
A design principle in which objects are responsible for carrying out system processing is called ______ ______.
(Fraud Triangle) Motivation
A desire or need for the results of the fraud. Money is the usual motivation, although a desire for status or power or even the need to be a "team player" may be contributing factors
class diagram
A detailed view of a single use case, showing the classes that participate in the use case and documenting the relationship among the classes.
C) entity-relationship model
A detailed, logical representation of the entities, associations, and data elements for an organization or business area defines: A) entity-relationship diagram B) conceptual model C) entity-relationship model D) data flow diagram
Cowboy Coding
A developer who jumps into writing software without carefully thinking it through ends up with errors, patches, and systems that are unreliable and difficult to update
activity diagram
A diagram that resembles a horizontal flowchart that shows the actions and events as they occur.
activity diagram
A diagram that resembles a horizontal flowchart that shows the actions and events as they occur. Activity diagrams show the order in which actions take place and identify the outcome.
system sequence diagram
A diagram that shows the messages between an actor and the system is called a _______.
with the adapter pattern
A different implementation of a function is required in an existing system. The best way to integrate this function into the system is ______
Systems Request
A document describing business reasons for project and system's expected value. Lists project's key elements: Project sponsor,Business need, Business requirements, Business value, Special issues or constraints
Project Scope Statement
A document prepared for the customer that describes what the project will deliver and outlines generally at a high level all work required to complete the project
semantic net
A drawing which shows individual objects and their links with other objects, and which is used to help understand the problem domain classes is called a _______ .
Nominal Group Technique (NGT)
A facilitated Process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator.
D) nominal group technique
A facilitated process that supports idea generation by groups where at the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator best describes: A) affinity clustering B) requirements structuring C) group interviews D) nominal group technique
Nominal Group Technique (NGT)
A facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator
Nominal Group technique
A facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator.
Nominal Group Technique (NGT)
A facilitated process that supports idea generation by groups. At the beginning of the process, group members work alone to generate ideas. The ideas are then pooled under the guidance of a trained facilitator
D) data store
A file folder containing orders is represented on a data flow diagram as a: A) process B) source C) data flow D) data store
Pubic Key Encryption
A form of asymmetric key encryption that uses a public key for encryption and a private key for decryption
Data Model
A formal way of representing the data that are used and created by a business system Shows the people, places and things about which data is captured and the relationships among them.
Subclass
A further division of objects in a class. Subclasses are more specific categories within a class.
subclass
A further division of objects in a class. ___________ are more specific categories within a class.
Top-down planning
A generic information systems planning methodology that attempts to gain a broad understanding of the information systems needs for the entire organization. Projects identified by top management or by a diverse steering committee.
Bottom-up planning
A generic information systems planning methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunity. Project initiatives stemming from managers, business units, or the development group
False
A good way to describe a use case scenario is with a state chart.
the CRUD technique
A good way to ensure that all the use cases have been identified is through _______________.
Data-flow diagram (DFD)
A graphic that illustrates the movement of data between external entities and the processes and data stores within a system
message
A labeled arrow between lifelines on a sequence diagram is called a _______________.
Internet
A large, world-wide network of networks that use a common protocol to communicate with each other
Access Control List
A list attached or linked to a specific resource that describes users or user groups and the nature of permitted access
True
A loop frame and an asterisk mean the same thing in a sequence diagram.
True
A loop or repeating message or messages in a sequence diagram is depicted by a rectangle box.
analysis is understanding, design is solution
A major comparison between analysis and design can be stated as:
analysis is understanding, design is solution
A major comparison between analysis and design can be stated as:
Baseline Project Plan
A major outcome and deliverable from the project initiation and planning phase that contains the best estimate of a project's scope, benefits, costs, risks, and resource requirements
Working in manageable modules
A manageable module is one that allows users to interact with its key features but can be built separately from other system modules. Module features that are deemed less important are purposely left out of the initial prototype.
Decision table
A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting action
C) decision table
A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions, defines a: A) structure chart B) state transition diagram C) decision table D) sequence diagram
Transport Layer Security (TLS)
A method for secure message transmission over the Internet.
B) has only outputs
A miracle process is one that: A) has only inputs B) has only outputs C) cannot be exploded further D) has insufficient inputs to produce the associated processes
fraud triangle
A model of fraud that states that opportunity, motivation, and rationalization must all exist for a fraud to occur
fraud triangle
A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.
fraud triangle
A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.
B) decision table
A modeling technique that allows you to represent a set of conditions and the actions that follow from them in a tabular format best describes: A) data flow diagram B) decision table C) flowchart D) Structured English
superclass
A more generalized category to which objects may belong
Superclass
A more generalized category to which objects may belong (e.g., a NOVEL class might belong to a superclass called BOOK).
A) attribute
A named property or characteristic of an entity that is of interest to the organization defines: A) attribute B) relationship C) instance D) gerund
Nonoperational prototype
A nonworking scale model that is set up to test certain aspects of the design.
True
A package diagram is useful to document the various subsystems in a system.
singleton
A pattern that ensures that it only instantiates itself one time is called the _____________ pattern.
Walkthrough
A peer group review of any product created during the systems development process
Entity
A person, place, event, or thing about which data is collected Must be multiple occurrences to be an entity
D) entity
A person, place, object, event, or concept in the user environment about which the organization wishes to maintain data refers to a(n): A) attribute B) data element C) relationship D) entity
ERD
A picture showing the information created, stored, and used by a business system. Entities generally represent similar kinds of information Lines drawn between entities show relationships among the data High level business rules are also shown
attribute
A piece of information about a particular object is called a _______.
C) verb phrase label
A process has a: A) pronoun label B) adjective label C) verb phrase label D) noun phrase label
Technical feasibilty
A process of assessing the development organization's ability to construct a proposed system
Economic feasibility
A process of identifying the financial benefits and costs associated with a development project
Aggregation
A relationship between a "sports team" and the players, coaches, and sponsor would be described as what kind of relationship?
mandatory
A relationship that has a cardinality constraint of one or more is a _______ relationship.
B) associative entity
A relationship that the data modeler chooses to model as an entity type best defines: A) recursive relationship B) associative entity C) domain D) complex relationship
D) enables you to work backwards from the information on a report to the data that must have been necessary to generate them
A report: A) indicates the inputs required for the new system B) describes how a particular job or task is performed, including data and information that are used and created in the process of performing the job C) indicates what data flow in or out of a system and which are necessary for the system to function D) enables you to work backwards from the information on a report to the data that must have been necessary to generate them
activation lifeline
A representation of a period during which a method of an object is alive and executing is called its ______ ______.
True
A return value in an interaction diagram is often a named object.
Remote Wipe
A security measure that automatically deletes sensitive data from a portable device when unauthorized accesses are attempted
True
A semantic net illustrates individual objects within a class diagram.
path
A sequential set of connected states and transitions is called a _______________.
Objective Statements
A series of statements that express an organization's qualitative and quantitative goals for reaching a desired future position
Repeatable Processes
A set of tasks and processes have been defined well enough to allow one to predict project results with reasonable accuracy; however, no method of forecasting improvements of making trade-offs is implemented.
C) Repeating Group
A set of two or more multivalued attributes that are logically related defines: A) relationship B) gerund C) repeating group D) class
C) ternary relationship
A simultaneous relationship among instances of three entity types is a: A) unary relationship B) binary relationship C) ternary relationship D) multiple occurrence
attribute
A single characteristic or fact about an entity. An ________ , or field, is the smallest piece of data that has meaning within an information system.
Attribute
A single characteristic or fact about an entity. An attribute, or field, is the smallest piece of data that has meaning within an information system. For example, a Social Security number or company name could be examples of an attribute. In object-oriented analysis, an attribute is part of a class diagram that describes the characteristics of objects in the class. Also known as a data element.
A) entity instance
A single occurrence of an entity type defines: A) entity instance B) entity appearance C) attribute D) data element
Instance
A specific member of a class.
instance
A specific member of a class.
D) source/sink
A square on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
Systems Development Methodology
A standard process followed in an organization to conduct all the steps necessary to analyze, design, implement and maintain information systems. To develop and support information systems
Secure Sockets Layer (SSL)
A standard set of methods and protocols that address authentication, authorization, privacy, and integrity
False
A state-machine diagram is usually developed for every class in the problem domain class diagram.
Mission Statement
A statement that makes it clear what business a company is in
Design of the user interface
A storyboard is useful for what?
Incremental commitment
A strategy in systems analysis and design in which the project is reviewed after each phase and continuation of the project is re-justified
Joint Application Design (JAD)
A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements
Joint Application Design (JAD)
A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review systems requirements.
Joint Application Design (JAD)
A structured process in which users, managers, and analysts works together for several days in a series of intensive meetings to specify or review systems requirements
C) subtype
A subgrouping of the entities in an entity type that is meaningful to the organization and that shares common attributes or relationships distinct from other subgroupings best defines: A) child node B) disjoined entity C) subtype D) supertype
True
A superclass only exists as part of a generalization/specialization.
B) source
A supplier of auto parts to our company is represented on a data flow diagram as a: A) process B) source C) data flow D) data store
multiplicity
A synonym for cardinality (used with UML class diagrams) is ____.
Patched-up prototype
A system that works but is patched up or patched together; a working model that has all the features but is inefficient.
Embracing change
A systems analyst needs to have the ability and methods to create dynamic, context-sensitive, scalable, and evolutionary applications. Agile modeling is therefore a change-embracing method.
Extreme programming (XP)
A systems development approach that accepts what we know as good systems development practices and takes them to the extreme. The genesis of agile approaches.
CRUD
A technique that is used to validate the set of use cases against identified classes is called __________ technique.
brainstorming technique
A technique to identify problem domain objects in which developers and users work together in an open group setting is called the _______ .
association
A term in UML that describes a naturally occurring relationship between specific things is called a _______.
use case description
A textual model that describes the processing details of a use case is called a ________.
False
A true/false condition on a message indicates the condition of the return value of the message, i.e. whether the message was successful or not.
False
A true/false condition on a sequence diagram indicates whether the message can be processed or not.
Break-even analysis
A type of cost-benefit analysis to identify at what point (if ever) benefits equals cost
package
A type of diagram that is used to define groups of classes as a subsystem is called a _______________ diagram.
Communication diagram
A type of interaction diagram that does not have activation lifelines is called a ____________ ____________ .
Communication diagram
A type of interaction diagram that emphasizes the objects that send and receive messages for a specific use case is called a _______ _______ .
sequence
A type of interaction diagram that emphasizes the order of the messages between objects for a specific use case is called a ________ diagram.
Inheritance
A type of object relationship. Inheritance enables an object to derive one or more of its attributes from another object (e.g., an INSTRUCTOR object may inherit many traits from the EMPLOYEE object, such as hire date).
inheritance
A type of object relationship. ________________ enables an object to derive one or more of its attributes from another object
composition
A type of relationship where between classes where the objects in one class are a part of the objects in another class AND they can only exist as part of the totality.
aggregation
A type of relationship where between classes where the objects in one class are a part of the objects in another class BUT they can also exist as separate objects alone.
scenario
A unique set of internal activities within a use case which represents a unique path through the use case is called a _______.
privileged user
A user who has special security and access to a system, such as the right to assign passwords, is called a ____.
privileged user
A user who has special security and access to a system, such as the right to assign passwords, is called a ____.
On-site customer
A user who is an expert in the business aspect of the systems development work is on-site during the development process. This person is integral to the process, writes user stories, communicates to team members, helps prioritize and balance the long-term business needs, and makes decisions about which feature should be tackled first.
B) describes how a particular job or task is performed, including data and information that are used and created in the process of performing the job
A written work procedure: A) indicates the job an analyst will need to perform on a given project B) describes how a particular job or task is performed, including data and information that are used and created in the process of performing the job C) indicates what data flow in or out of a system and which are necessary for the system to function D) enables you to work backwards from the information on a report to the necessary data
Security Controls
Access Controls Data Encryption Digital Signatures and Certificates Secure Transactions
First iteration
According to an Agile iterative development process in which iteration would design activities normally start?
First iteration
According to an Agile iterative development process in which iteration would design activities normally start?
False
Activity diagrams are not helpful in developing system sequence diagrams (SSDs).
False
Activity diagrams are not helpful when the flow of activities is too complex.
System Sequence Diagrams
Activity diagrams are useful in the development of ______________.
False
Activity diagrams cannot be used to describe processes that involve automated system activities.
B) event
All business processes begin and end with a(n): A) starting and termination points B) event C) activity D) gateway
C) purchased models are very specific
All of the following are benefits of database patterns and packaged data models EXCEPT: A) purchased models are proven from extensive experience B) systems analysis is facilitated C) purchased models are very specific D) purchased models anticipate future needs
A) decision
All of the following are symbols used in business process modeling EXCEPT: A) decision B) gateway C) event D) activity
Rapid Prototyping
Allows an analyst to gain insight about the remainder of the project; showing users early in the process how parts of the system actually perform guards against overcommitting resources to a project that may eventually become unworkable.
Manageable Module
Allows users to interact with its key features but can be built separately from other system modules; module features that are deemed less important are purposely left out of the initial prototype.
C) analysis
An E-R model with attributes is prepared during: A) design B) project identification and selection C) analysis D) project initiation and planning
True
An Opt frame and a true/false condition on a message serve essentially the same purpose.
False
An Opt frame and an Alt frame do essentially the same thing.
False
An abstract class is used to describe a "thing" that is abstract, i.e. not tangible.
True
An activity diagram and the flow of activities in a fully developed use case description serve the same purpose.
True
An actor is always outside of the automation boundary.
state
An adjective that describes an object's current status
State
An adjective that describes an object's current status (e.g., a student could be a CURRENT, FUTURE, or PAST student).
unit of software
An application component can be thought of as a __________
unit of software
An application component can be thought of as a __________.
B) data flow
An arrow on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
message
An arrow on a system sequence diagram is used to depict a what?
A) triggering operation
An assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete is: A) triggering operation B) entity integrity C) referential integrity constraints D) domains
B) relationship
An association between the instances of one or more entity types that is of interest to the organization best defines: A) occurrence B) relationship C) coupling D) cardinality
many to many
An association class is frequently required for what kind of relationship?
association class
An association that is also treated as a class is called a _______.
C) candidate key
An attribute (or combination of attributes) that uniquely identifies each instance of an entity type defines: A) data element occurrence B) trigger C) candidate key D) gerund
key
An attribute for an object which can be used to uniquely identify that object is called a _______.
compound attribute
An attribute that contains a collection of related attributes is called a _______.
B) multivalued attribute
An attribute that may take on more than one value for each entity instance is referred to as a: A) gerund B) multivalued attribute C) nonexclusive attribute D) supertype
key attribute
An attribute whose value uniquely identifies an object is called a _______.
Prototype
An early approximation of a final system or product.
Asymmetric Key Encryption
An encryption method that uses different keys to encrypt and decrypt the data
Symmetric Key Encryption
An encryption method that uses the same key to encrypt and decrypt the data
social security number
An example of an attribute of an object might be _______.
(Fraud Triangle) Rationalization
An excuse for committing the fraud or an intention to "undo" the fraud in the future. ex. An employee might falsify financial reports to stave off bankruptcy, thus enabling fellow workers to keep their jobs. Or an employee might steal money to pay a personal bill / debt, with the intention of paying back the money later.
A) dash (-)
An indifferent condition is represented by a(n): A) dash (-) B) asterisk (*) C) exclamation point (!) D) pound sign (#)
boundary
An input window class is an example of a ____ design class type.
Digital Certificate
An institutions name and public key encrypted and certified by a third party
field combination
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
field combination
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.
False
An interaction diagram is a subclass of a sequence diagram.
Hypertext Transfer Protocol Secure (HTTPS)
An internet standard for secure transmitting Web pages. All modern Web browsers and servers support HTTPS.
Prototyping
An iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between an analyst and users.
Protoyping
An iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between an analyst and users.
Prototyping
An iterative process of systems development in which requirements are converted to a working system that is continually revised through close collaboration between analyst and users
Message
An object-oriented command that tells an object to perform a certain method.
message
An object-oriented command that tells an object to perform a certain method.
objects
An object-oriented program consists of a set of computing ______.
False
An object-oriented program consists of a set of object classes that work together to process an input message.
True
An objective of security controls is to maintain a stable operating environment for users.
Corporate Strategic Planning
An ongoing process that defines the mission, objectives, and strategies of an organization
Information Systems Planning
An orderly means of assessing the information needs of an organization and defining the systems, databases, and technologies that will best satisfy those needs
Digital Certificate
An organizations name and public that is encrypted and certified by an authorized third party
True
An oval indicates an embedded use case inside of an activity diagram.
Objective of system analysis
Analysis involves decomposition. Analysts then organize, structure, and document the problem domain knowledge by building requirements models Requires extensive user involvement to explain the requirements and to verify that the models are accurate
What major skills does a systems analyst need?
Analytical skills, technical skills, management skills, interpersonal skills
Sponsor:
As a major undertaking due to its expense, a JAD must be sponsored by someone at a relatively high level in the company. If the sponsor attends any sessions, it is usually only at the very beginning or the end.
Relationships
Associations between entities The first entity in the relationship is the parent entity; the second entity in the relationship is the child entity Relationships should have active verb names Relationships go in both directions
C) 16
Assume the first condition has four values; the second condition has two values; the third condition has two values. How many rules will there be? A) 8 B) 7 C) 16 D) 24
B) 12
Assume the first condition has two values; the second condition has two values; the third condition has three values. How many rules will there be? A) 7 B) 12 C) 6 D) 11
D) 18
Assume we have three conditions. Condition one has two values; condition two has three values; condition three has three values. How many rules are needed? A) 8 B) 6 C) 5 D) 18
____ are characteristics that describe the object.
Attributes
False
Attributes are part of a UML class diagram, but not included in ERD diagrams.
True
Attributes can sometimes be combined together to form a larger group.
Key-value data stores essentially provide a distributed index (primary key) to where a ___ is stored.
BLOB (binary, large object)
C) identifying selection criteria
Basic procedures for constructing a decision table do not include: A) listing all possible rules B) naming the conditions and the values each condition can assume C) identifying selection criteria D) simplifying the decision table
Designing security and controls impacts the design of which other elements?
Because they are embedded in all other design activities, securities and controls are important parts of activities such as designing a user interface, a database, or application components.
IS staff:
Besides systems analysts, other information systems (IS) staff, such as programmers, database analysts, IS planners, and data center personnel, may attend to learn from the discussion and possibly to contribute their ideas on the technical feasibility of proposed ideas or on technical limitations of current systems.
Entity
Box, is a person, place, or thing; has a singular name spelled in all capital letter; has an identifier; should contain more than one instance of data
What are the two ways to acquire software?
Build it or Buy it
Design the application components
Build or buy questions are usually addressed during which design activity?
Selected-features prototype
Building an operational model that includes some, but not all, of the features that the final system will have.
Selected Features Prototype
Building an operational model that includes some, but not all, of the features that the final system will have. - Not all essential features are included - Built in modules - Part of the actual system
Explain the rules for creating entity relationship diagrams
Business Rules: constraints that are followed when the system is in place -Certain entities must exist before relationships are created -Certain entity is optional for relation to any entity (optional) -How many can be related (only one or more than one) (how many)
What drives projects?
Business needs
What are some reasons to initiate planning phase of the SDLC
Business opportunity, requests to deal with problems in current procedures, the desire to perform additional tasks, or the realization that information technology could be used to capitalize on an existing opportunity Corporate objectives New products...additional revenue Reduce costs Consolidation from mergers Government regulations Changes in business practices Vendor changes Technology changes
A) decouples the processe
By placing a data store between two processes, this: A) decouples the processes B) enables store and forward capabilities C) enhances the flow of data between the processes D) structures the processes
Create, Read, Update, Delete
CRUD stands for _______________.
D) process
Calculating an employee's salary is represented on a data flow diagram as a: A) data flow B) source C) data store D) process
Independent Entity
Can exist without the help of another entity Identifiers created from the entity's own attributes Attributes from other entities are not needed to uniquely identify instances of these entities
Advantages of Network Diagrams
Can represent how completion times vary for activities. Composed of circles or rectangles representing activities and connecting arrows showing required work flows. Has the ability to use probability estimates in determining critical paths and deadlines
False
Cohesion is a measure of how well the system "hangs together" by having strong connections between classes.
sequence numbers
Communication diagrams indicates the order of the messages with ____.
Agile values
Communication, simplicity, feedback, and courage.
False
Completeness control is an integrity control that identifies when a value in a field is too large or too small.
C) analysis
Conceptual data modeling is typically done in parallel with other requirements analysis and structuring steps during: A) logical design B) physical design C) analysis D) implementation
C) the development group is small
Continual user involvement works best when: A) the number of end users is large B) the number of end users is small C) the development group is small D) the development group is large
Access Control
Control that limits a user's ability to access resources, such as servers, files, web pages, application programs, and database tables
Value Limit Controls
Controls that check numeric data input to ensure that the value is reasonable
Output Controls
Controls that ensure output arrives at the proper destination and is accurate, current, and complete
Completeness Controls
Controls that ensure that all required data values describing an object or transaction are present
Data Validation Controls
Controls that ensure that numeric fields that contain codes or identifiers are correct
Input Controls
Controls that prevent invalid or erroneous data from entering the system
Security Controls
Controls that protect the assets of an organization from all threats with a primary focus on external threats
Integrity Controls
Controls that reject invalid data inputs, prevent unauthorized data outputs, and protect data and programs against accidental or malicious tampering
Field combination controls
Controls that review combinations of data inputs to ensure the correct data are entered
How do you evaluate criteria for off-the-shelf software packages?
Cost, functionality, vendor support, vendor viability, flexibility, documentation, response time, ease of installation
False
Cowboy coding is one of the newer techniques programming, often used with Agile techniques.
First-of-a-Series Prototype
Creating a pilot; completely operational; useful when many installations of the same information system are planned. A full-scale prototype is installed in one or two locations first, and if successful, duplicates are installed at all locations based on customer usage patterns and other key factors.
Relational Database Management Systems (RDBMS)
Current technology frequently use _________?
Level-0 Diagram
DFD that represents a system's major processes, data flows, and data stores at a high level of detail.
What is analyzed via methodologies?
Data (input/capture and storage) Information (output/presentation) Data flow (movement/transfer) Processing logic (manipulation/analysis)
contain Structure Query Language (SQL) statements
Data access layer classes should ____.
B) data store
Data at rest, which may take the form of many different physical representations, defines: A) source B) data store C) data flow D) process
Data Store
Data at rest, which may take the form of many different physical representations.
A) process models
Data flow diagrams that concentrate on the movement of data between processes are referred to as: A) process models B) data models C) flow models D) flow charts
D) data flow
Data in motion, moving from one place in a system to another, defines: A) data store B) process C) source D) data flow
Which two models need to be balanced
Data models should balance with process models
False
Database design is somewhat of a stand-alone activity because each database runs under its own DBMS.
False
Database design often requires someone with analysis skills since many decisions must be made about the field sizes and characteristics.
method
Defines specific tasks that an object must perform.
Method
Defines specific tasks that an object must perform. Describes what and how an object does something.
False
Defining the technology architecture is part of the activity to Design the application components.
False
Dependency relationships cannot exist between classes within packages.
object model
Describes objects, which combine data and processes.
object model
Describes objects, which combine data and processes. Object models are the end product of object-oriented analysis.
Objective of system design
Design is much more oriented towards technical issues, and therefore require less user involvement and more involvement by other systems professionals Output of design activities is a set of diagrams and documents that models various aspects of the solution system
Why is the singular form of the term 'user interface' usually a misnomer?
Designing a single user interface is now the exception, not the norm. Ever-improving technology expands and changes user-interface requirements. A decade ago, user-interface design was concerned primarily with simplifying the presentation of information on desktop computer monitors and minimizing task-related keystrokes and mouse clicks. In the modern world, designers must deal with multiple screens ranging from phones to large monitor displays.
True
Designing a single user interface is now the exception, not the norm.
interaction
Developing a ____ diagram is a multistep process of determining which objects work together and how they work together.
D) all of the above
Drawbacks to prototyping include: A) a tendency to avoid creating formal documentation of systems requirements that can then make the system more difficult to develop into a fully working system B) prototypes becoming very idiosyncratic to the initial user and difficult to diffuse or adapt to other potential users C) prototypes being built as stand-alone systems D) all of the above
True
During analysis, analysts build models to represent the real world and to understand the desired business processes with the information used in those processes.
Answer: impertinence
During requirements determination, the systems analyst characteristic that says you should question everything is ________.
A) an E-R model represents conceptual data requirements for a particular system
During requirements structuring: A) an E-R model represents conceptual data requirements for a particular system B) the conceptual E-R data model is refined before it is translated into a logical format from which database definition and physical database design are done C) an enterprise-wide data model with very broad categories of data and little detail is prepared D) a specific E-R model is built to help explain the scope of a particular systems analysis and design effort
False
Each concurrent path in a state-machine diagram will contain multiple states.
Business-to-business
Electronic commerce between business partners such as suppliers and intermediaries
Business-to-consumer
Electronic commerce between businesses and consumers
Business-to-employee
Electronic commerce between businesses and their employees
relationships
Enable objects to communicate and interact as they perform the business functions and transactions required by a system.
Relationships
Enable objects to communicate and interact as they perform the business functions and transactions required by a system. Relationships describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses.
True
Every state-machine diagram must have both origin states and destination states.
Types of prototypes
Evolutionary: you begin modeling parts of the target system and if the system is successful than you build the rest of the system around it Throwaway: doesn't preserve the prototype that has been developed; the prototype is never used in the actually system
Intersection Entity
Exists in order to capture some information about the relationship that exists between two other entities.
A master file holds information temporarily so that it can be used to update other master files.
False
In terms of storage space, the most efficient tables in a relational database have redundant data and many null values.
False
It is likely easier today to find expertise in OODBMS than in RDBMS.
False
Mapping from the problem domain to the data management objects in an RDBMS format is a straightforward one-to-one mapping.
False
The Object Relational DBMS has all advantages from both the Relational DBMS and the Object-Oriented DBMS.
False
The two primary dimensions to optimize a relational database are storage efficiency and future needs.
False
First-of-a-series prototype
First full-scale model of a system, often called a pilot; completely operational.
B) underlined on an E-R diagram
For each entity, the name of the identifier is: A) identified by using a double-lined ellipse B) underlined on an E-R diagram C) bold on an E-R diagram D) written in all capital letters on an E-R diagram
status condition
For real-world objects the state of an object is the same as its _______.
C) indicate what data flow in or out of a system and which are necessary for the system to function
Forms are important for understanding a business because they: A) indicate the correct sequencing of tasks B) describe how particular tasks are performed C) indicate what data flow in or out of a system and which are necessary for the system to function D) enable you to work backwards from the information on a report to the necessary data
C) when they contain actual organizational data
Forms are most useful: A) when they do not contain any data B) during the initial planning stages C) when they contain actual organizational data D) during the design stage
Differences between Gantt chart and Network Diagram
Gantt charts visually show the duration of tasks, whereas a network diagram visually shoes the sequence dependencies between tasks. Gantt charts visually show the time overlap of tasks, whereas a network diagram does not show time overlap but does show which tasks could be done in parallel. Some Gantt charts can visually show slack time available within an earliest start and latest finish duration. A network diagram shows this by data within activity rectangles
parameter-list
Given the following partial syntax for a message, the underline represents what part of the message? "sequence-number: return-value := message-name (_______)"
Customer to Order
Given two classes, customer and order, which class would probably have navigational visibility to which class?
Assume simplicity
Good design is often simple.
D) seeking a variety of perspectives from the interviews
Good interview guidelines consist of: A) phrasing the question to illicit the correct response B) typing your notes within two weeks of the interview C) establishing expectation levels about the new system D) seeking a variety of perspectives from the interviews
C) process modeling
Graphically representing the functions, or processes, which capture, manipulate, store, and distribute data between a system and its environment and between components within a system refers to: A) data modeling B) flow charting C) process modeling D) transition modeling
Process Modeling
Graphically representing the processes that capture, manipulate, store, and distribute data between a system and its environment and among components within a system
C) numbering
Guidelines for drawing DFDs include the following except for: A) completeness B) consistency C) numbering considerations D) timing considerations
B) violation of consistency
Having a level-1 diagram with no level-0 diagram is an example of a: A) violation of completeness B) violation of consistency C) gap D) structuring violation
adds complexity
High coupling ____ in a system.
Cardinality
How many times it can be related to another entity
(Design Activities: Key Question) Design the database
How will data be captured, structured, and stored for later use by the information system?
Key question for: Design the database
How will the data be captured, structured, and stored for later use by the information system?
(Design Activities: Key Question) Describe the Environment
How will this system interact with other systems and with the organizations existing technologies?
Key Question for Describe the environment?
How will this system interact with other systems and with the organizations existing technologies?
(Design Activities: Key Question) Design the user interface
How will users interact with the information system?
Key questions for: Design the user interface
How will users interact with the information system?
How do you better project management?
Identify manageable tasks (and schedule them) Use formal estimating methods Use well-defined project management processes (includes assessing risks and mitigating them, tracking progress, conducting walkthroughs to find/remove errors, managing expectations and change)
3 steps in Building ERDs
Identify the entities Add attributes and assign identifiers Identify relationships
B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule
If Rules 2, 4, and 6 are indifferent conditions, then: A) Rules 2, 4, and 6 are eliminated from the matrix B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule C) Rules 2, 4, and 6 will result in at least two additional rules being included in the matrix D) Rules 2, 4, and 6 have no impact on the interpretation of the matrix
B) binary relationship
If STUDENT and COURSE participate in a relationship, their relationship is a(n): A) unary relationship B) binary relationship C) ternary relationship D) extraordinary relationship
C) balancing
If a data flow appears on the context diagram and is also represented at level-0, this would be referred to as: A) leveling B) flow conservation C) balancing D) matching
A) appear on the context diagram
If an input from a source appears at level-0, it must: A) appear on the context diagram B) be connected to a data flow C) be connected to a sink D) be connected to a data store
B) multivalued attribute
If each employee can have more than one skill, then SKILL is referred to as a: A) gerund B) multivalued attribute C) nonexclusive attribute D) repeating attribute
C) the minimum cardinality of the relationship is one
If entity B is a mandatory participant, then: A) the minimum cardinality of the relationship is two B) the minimum cardinality of the relationship cannot be defined C) the minimum cardinality of the relationship is one D) the minimum cardinality of the relationship is optional
The message is not sent
If the True/False condition on a message evaluates to false in a sequence diagram, which of the following is correct?
C) be coupled to each other
If two processes are connected by a data flow, they are said to: A) share the same timing effects B) share the same data C) be coupled to each other D) be strapped to each other
composite
If we modeled a "sale" and the "sale items" with a whole-part relationship, it would best be described as a _______ relationship.
Order Handler
If you are doing detailed design for the use case Create New Order, which class should receive the first input?
C) complete
If your DFD contains data flows that do not lead anywhere, it is not: A) gap proof B) a primitive diagram C) complete D) consistent
B) call the duplication to the attention of management as an issue to be resolved before system design can proceed
If your analysis of several written procedures reveals a duplication of effort in two jobs, you should: A) indicate that one job be deleted from the new system B) call the duplication to the attention of management as an issue to be resolved before system design can proceed C) justify the duplication of effort D) restructure the tasks so that the duplication is removed
D) All of the above are correct.
In BPR, which of the following questions are used to identify activities for radical change? A) How important is the activity to delivering the outcome? B) How feasible is changing the activity? C) How dysfunctional is the activity? D) All of the above are correct.
False
In UML a zero to many multiplicity constraint is shown with a "O" and crows feet on the line.
multiplicity
In UML notation for object-oriented approach the term _______ is used instead of cardinality.
action
In UML terminology in a sequence diagram, a message refers to a _______.
an optional relationship
In UML the constraint denoted by "0..*" indicates what?
guillemets
In Unified Modeling Language (UML) notation, a stereotype is indicated by ____.
symmetric
In ____________________ encryption, the same key encrypts and decrypts the data.
Indifferent condition
In a decision table, a condition whose value does not affect which actions are taken for two or more rules
A) indifferent condition
In a decision table, a condition whose value does not affect which actions are taken for two or more rules is referred to as a(n): A) indifferent condition B) static condition C) fixed condition D) flexible condition
a solid arrow between the classes, pointing to the visible class
In a design class diagram, navigation visibility is identified by ____.
What objects must exist prior to the use case executes.
In a fully developed use case description normally the preconditions describe what?
What conditions prevent the system from successfully completing the use case.
In a fully developed use case description the exception conditions represent what?
The existence of domain model objects.
In a fully developed use case description the postcondition data describes what conditions?
An activity diagram
In a fully developed use case description, the flow of activities is most similar to what?
abstract
In a generalization/specialization relationship, it would not make sense for a class at the bottom of the hierarchy to be a ______ class.
generalization/specialization
In a relationship where there are superclasses and subclasses, the relationship is called a _______ relationship.
A return message
In a sequence diagram a horizontal dashed line represents what?
verb-noun
In a sequence diagram the message-name is usually given in what format?
return value
In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter B represents what?
parameter list
In a sequence diagram the syntax of a message is given by the following: [A] B := C (D) The letter D represents what?
lifeline
In a sequence diagram, ___________ is used to represent the time during which the object above it is able to interact with the other objects in the use case.
focus
In a sequence diagram, a ____________ indicates when an object sends or receives a message.
focus
In a sequence diagram, a focus indicates when an object sends or receives a message. It is indicated by a narrow vertical rectangle that covers the lifeline.
Lifeline
In a sequence diagram, a lifeline is used to represent the time during which the object above it is able to interact with the other objects in the use case. An X marks the end of a lifeline
True
In a sequence diagram, a message is considered to be an action that is invoked on the destination object.
perfect memory assumption
In a sequence when one assumes that the objects are already available to receive messages, that is considered to be the _______.
concurrency
In a state machine diagram when an object is in multiple states at the same time it is called _________.
oval
In a state machine diagram, a state is represented by a _______.
False
In a system sequence diagram a box refers to a class of objects.
False
In a system sequence diagram the order of the messages is determined by numbering the messages.
action expression
In a transition label in a state machine the syntax is A(B)[C]/D. The D stands for what?
True
In an activity diagram, a separate use case may used as part of the workflow.
True
In an interaction diagram, messages are sent and received by individual objects, not by classes.
B) gateway
In business process modeling, a decision point is called a(n): A) activity B) gateway C) terminal D) loop
A) swimlane
In business process modeling, a way to encapsulate a process is called a(n): A) swimlane B) fastlane C) lane D) none of the above
property
In design class notation, the ____ of an attribute is enclosed in curly braces {}.
True
In generalization/specialization the objects in a subclass are always also contained in the parent class.
child
In inheritance, _________ is the object that derives one or more attributes from another object, called the parent.
parent
In inheritance, __________ is the object from which the other object, the child, derives one or more attributes.
Child
In inheritance, a child is the object that derives one or more attributes from another object, called the parent.
Parent
In inheritance, a parent is the object from which the other object, the child, derives one or more attributes.
True
In order for an object to send a message to another object it must have navigation to that object.
A) data store
In the Gane and Sarson model, a rectangle that is missing its right vertical sides on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
C) process
In the Gane and Sarson model, a rectangle with rounded corners on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
True
In the object-oriented approach to systems development, the flow of information is achieved by sending messages either to and from actors or back and forth between internal objects.
data entities
In the traditional approach to system development, the system stores information about ____.
True
In user interface design the detailed screen layouts should be done after the devices have been decided.
True
In using the CRUD technique, new use cases and new stakeholders may be identified.
Data
Information System requires _______?
Attributes
Information captured about an entity Only those used by the organization should be included in the model Attribute names are nouns Sometimes entity name is added at the beginning of the attribute name for clarity
False
Information for Use Case Descriptions is primarily derived from System Sequence Diagrams.
classes share some attributes
Inheritance describes a condition between classes where _______.
Integrity Controls
Input Controls Output Controls Backup and Recovery Fraud Prevention
IP Security (IPSec)
Internet standard for secure transmission of low-level network packets
Electronic Commerce
Internet-based communication to support day-to-day business activities
B) group interviewing
Interviewing several key people at once refers to: A) stakeholder interviewing B) group interviewing C) user interviewing D) strategic interviewing
Incremental change
Introducing many small, gradual changes to a project instead of a few large, rapid changes.
Managed Reuse
Is a more structured, more expensive, mode of managing software reuse. With managed reuse, the development, sharing, and adoption of reusable assets is mandated
Hypertext Transfer Protocol
Is an application protocol for distributed, collaborative, and hypermedia information systems.
-Scope & Size -Programming Language -Build or Buy
Issues involve how to package components including?
True
It is better to have the data access object create a new object when multiple objects may be created.
False
It is just as important to have heavy user involvement during analysis as it is during design.
Agile Methodologies
Iterative development - Repetition of refining steps Successively closer to goal Evolutionary/adaptive Continuous, self-adapting change simpler state to more complex or better state Focus on people not roles (people are talented and creative, not replaceable parts) example: eXtreme programming - software development approach
-Communication with External Systems -Conforming to an Existing Technology Architecture
Key elements in the environment
Security and controls design
Limiting user access to the system is considered what type of design activity?
Security and controls design
Limiting user access to the system is considered what type of design activity?
Systems Thinking
Looking at a situation as a system of interacting components: abstracting, decomposing. Then identifying a problem and designing, selecting, and implementing a solution. Then simplifying, re-engineering internals of (i.e., processes) and interactions between components - including interfaces, using cohesion, decoupling
Successive Iterations
Making a prototype modifiable means creating it in modules that are not highly interdependent
Modifying the prototype
Making a prototype modifiable means creating it in modules that are not highly interdependent. Each modification is followed by an evaluation by users.
Systems analysts
Members of the systems analysis team attend the JAD, although their actual participation may be limited. Analysts are there to learn from users and managers, not to run or dominate the process.
True
Message names should be given to indicate the service requested from the destination object.
False
Messages are comprised of five elements, all of which are optional except the method name.
____ resemble verbs that describe what and how an object does something.
Methods
False
Model building is a unique to Systems Analysis.
Designed Reuse
Most expensive and extensive approach - in addition to mandating reuse and measuring its effectiveness, this approach takes another step of mandating the assets to be designed for reuse as they are being designed for specific applications. Focus more on developing reusable assets then finding existing ones
Facilitated Reuse
Not required to practice reuse but encouraged. Organization makes tools and techniques available that enable the development and sharing of reusable assets
tie the exception condition to a processing step
Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to _______.
D) both A and B
On a data flow diagram, you may: A) repeat data stores B) repeat sources/sinks C) repeat processes D) both A and B
asterisk
On a sequence diagram a short notation that indicates a repeating message is a _______.
loop frame
On a sequence diagram when multiple messages are included within a repeating loop a _______ is used to document it.
True
On a sequence diagram, a message represents a service request.
True
On a sequence diagram, view layer objects send messages to the controller.
[]
On a systems sequence diagram, ____ indicate(s) a true/false condition.
Flow of activities
On an Activity Diagram the arrows represent what?
Return value(s)
On an SSD, a dashed arrow usually represents what?
An object
On an SSD, a named rectangular box represents what?
False
On an activity diagram, the diamond represents an "AND" condition.
swim lanes
On an activity diagram, what are the vertical rectangles that contain the activity ovals called?
To initiate alternative paths
On an activity diagram, which of the following is NOT a valid use of a synchronization bar?
C) previously unknown information can result
One advantage of open-ended questions in an interview is: A) a significant amount of time can be devoted to each interviewee B) the interviewee is restricted to providing just a few answers C) previously unknown information can result D) they work well when the answers to the questions are well known
False
One of the disadvantages of UML and object-oriented models is the difficulty of synchronizing the models.
True
One of the first steps in designing the application components is to divide the software into subsystems.
Identifier
One or more attributes can serve as the entity identifier, uniquely identifying each entity instance Concatenated identifier consists of several attributes An identifier may be 'artificial,' such as creating an ID number Identifiers may not be developed until the Design Phase
noun technique
One technique for finding "things" that need to be in the new system is done by the analyst starts making lists of "things." He may do this from information and even without talking to the users extensively. This technique is called the _______.
brainstorming technique
One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.
Types of questions:
Open ended questions: questions in interviews that have no prespecified answers. Close ended questions: questions in interviews that ask those responding to choose from among a set of specified responses Closed-ended questions, like objective questions on an examination, can follow several forms, including the following choices:
False
Package diagrams are used primarily when designing the software classes.
False
Package diagrams are used primarily when designing the software classes.
Registered Users
People who are authorized to access the system
Unauthorized Users
People who aren't allowed access to any part or function of the system
Privileged Users
People who have access to the source code, executable program, and database structure of the system
SDLC/Prototyping Hybrid Drawbacks
Prematurely shaping a system before the problem or opportunity is thoroughly understood; may result in producing a system that is accepted by specific groups of users but is inadequate for overall system needs.
Plan the Interview
Prepare interviewee: appointment, priming questions Prepare checklist, agenda, and questions • Listen carefully and take notes (record if permitted) • Review notes within 48 hours of interview • Be neutral • Seek diverse views
Authorization
Process of allowing or restricting a specific authentication user's access to a specific resource based on an access control list
encryption
Process of altering data so unauthorized users can't view them
Multi-Factor Authentication
Process of using multiple authentication methods for increased reliability
A) they each describe different but complementary views of the same information system
Process, logic, and data model descriptions of a system must be consistent and complete because: A) they each describe different but complementary views of the same information system B) they are prepared during the analysis phase C) they are constructed in parallel by separate analyst teams D) programming tasks require the integration of the information contained in the diagrams
False
Prototypes and mock-ups are most useful in doing the design of the software classes.
B) communication problems have existed in the past between users and analysts
Prototyping is most useful for requirements determination when: A) user requirements are well understood B) communication problems have existed in the past between users and analysts C) possible designs are simple and require an abstract form to fully evaluate D) multiple stakeholders are involved with the system
open-ended questions
Questions in an interview that have no pre-specified answers
B) closed-ended questions
Questions in interviews asking those responding to choose from among a set of specified responses are: A) specific questions B) closed-ended questions C) open-ended questions D) structured questions
Closed-ended Questions
Questions in interviews that ask those responding to choose from among a set of specified answers.
Open-ended questions
Questions in interviews that have no pre-specified answers
C) open-ended questions
Questions in interviews that have no pre-specified answers are: A) nonspecific questions B) closed-ended questions C) open-ended questions D) investigative questions
Open-Ended Questions
Questions in interviews that have no prespecified answers.
Most NoSQL data stores were created to address problems associated with storing large amounts of distributed data in ___.
RDBMSs
C) closed-ended question
Rating a response or idea on some scale, say from strongly agree to strongly disagree, would be classified as a(n): A) open-ended question B) JAD question C) closed-ended question D) ranking question
A) process
Recording a customer's payment is represented on a data flow diagram as a: A) process B) source C) data flow D) data store
B) Planning Game
Referencing eXtreme programming, which of the following is a stylized approach to development that seeks to maximize fruitful interaction between those who need a new system and those who built it? A) Iteration Planning Game B) Planning Game C) eXtreme Walkthrough D) eXtreme JAD
B) design
Referencing eXtreme programming, which of the following is not a Planning Game phase? A) exploration B) design C) commitment D) steering
D) steering
Referencing eXtreme programming, which of the following is the final phase of the Planning Game? A) exploration B) design C) commitment D) steering
A) programmers
Referencing eXtreme programming, who plays the Iteration Planning Game? A) programmers B) business managers and analysts C) end users, business managers, and analysts D) programmers, analysts, and end users
Modality
Refers to whether or not an instance of a child entity can exist without a related instance in the parent entity
Dependent Entity
Relationships when a child entity does require attributes from the parent entity to uniquely identify an instance
B) decision table
Removing any rules with impossible actions to make which of the following simple as possible? A) activity diagram B) decision table C) structure chart D) hierarchical chart
use case
Represents the steps in a specific business function or process in UML.
Independent random sampling
Requires that each individual has an equal chance of being selected and that the probability of being selected stays constant from one selection to the next if more than one individual is choosen
Random Sampling
Requires that each individual in the population has an equal chance of being selected
True
Security design and encryption issues are addressed during database design.
state transition diagram
Shows how an object changes from one state to another, depending on the events that affect the object.
Binomial distribition
Shows the probability associated with each value of x
system boundary
Shows what is included and excluded from a system.
system boundary
Shows what is included and excluded from a system. Depicted by a shaded rectangle in use case diagrams.
Managed Processes
Significant quantitative and qualitative improvements are possible because the process itself is managed and evolutionary. Each technology implementation is part of an overall architecture.
False
Since the design activities all interact with each other, it really doesn't matter which activity occurs first.
False
Since the design activities all interact with each other, it really doesn't matter which activity occurs first.
design class diagram
Software methods are usually identified in which design model?
Design class diagram
Software methods are usually identified in which design model?
D) all of the above
Some systems developers believe that a data model is the most important part of the statement of information system requirements because: A) the characteristics of data captured during data modeling are crucial in the design of databases, programs, computer screens, and printed reports B) data rather than processes are the most complex aspects of many modern information systems and thus require a central role in structuring system requirements C) the characteristics about data are reasonably permanent D) all of the above
D) business rules
Specifications that preserve the integrity of the logical data model are: A) requirements specifications B) integrity restrictions C) business limitations D) business rules
B) data flow
Student data contained on an enrollment form is represented on a data flow diagram as a: A) process B) data flow C) source D) data store
False
Symmetric key encryption uses a public key and a private key.
True
Synchronization bars are used to indicate looping in an activity diagram.
Digital Signature
Technique in which a document is encrypted by using a private key to verify who wrote the document
A) JAD
Techniques developed to keep the analysis effort minimal, yet still effective include: A) JAD B) interviewing C) observations D) quiz sessions
-Content Filtering -Encryption -Firewalls
Technologies available to help prevent and build resistance to attacks include?
Disruptive technologies
Technologies that enable that breaking of long-held business rules that inhibit organizations from making radical business changes
C) disruptive technologies
Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes best defines: A) technology barriers B) business process reengineering C) disruptive technologies D) business constraints
Disruptive Technologies
Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes.
Disruptive technologies
Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes.
Action Stubs
That part of a decision table that ists the actions that result for a given set of conditions
Condition Stubs
That part of a decision table that lists the conditions relevant to the decision
Rules
That part of a decision table that specifies which actions are to be followed for a given set of conditions
True
The CRUD technique can be used to identify new use cases as well as delete unnecessary use cases.
Let the customer object do it.
The Sales subsystem needs to instantiate a new cart object. How should this be done?
use case diagram and the problem domain class diagram
The ____ are the primary models from which other models draw information.
adapter
The _____________ pattern can be used to connect two disparate systems.
factory
The _______________ pattern is used to instantiate objects as a service.
(Fraud Triangle) Opportunity
The ability of a person to take actions that perpetrate a fraud. ex. unrestricted access to all functions of an accounts payable system enables an employee to generate false vendor payments
C) functional decomposition
The act of going from a single system to several component processes refers to: A) structuring B) balancing C) functional decomposition D) formatting
Before the object enters the destination state.
The action-expression occurs when?
pseudostate
The beginning state of an object when its states are diagrammed is called a ___________.
False
The best use of the CRUD technique is used to generate new use cases.
False
The cardinality of a class is a measure of the number of objects in the class.
polymorphism
The concept that a message gives different meanings to different objects
Polymorphism
The concept that a message gives different meanings to different objects (e.g., a GOOD NIGHT message might produce different results depending on whether it is received by a child or the family dog).
Time value of money
The concept that money available today is worth more than the same amount tomorrow
B) action
The condition that causes the operation to be triggered: A) condition B) action C) entity name D) user rule
Balancing
The conservation of inputs and outputs do a data-flow diagram process when that process is decomposed to a lower level.
B) balancing
The conservation of inputs and outputs to a data flow diagram process when that process is decomposed to a lower level defines: A) decomposition B) balancing C) conservation D) data flow structuring
instantiation
The creation of a programming object based on the template provided by the class definition is called _______.
cardinality
The crows feet notation on an ERD is a type of _______ constraint.
Present Value
The current value of a future cash flow
D) event
The data manipulation operation (insert, delete, or update) that initiates the operation is called a(n): A) condition B) action C) user rule D) event
A) top-down approach
The data modeling perspective that derives the business rules for a data model from an intimate understanding of the nature of the business, rather than from any specific information requirements in screens, reports, or business forms, is referred to as the: A) top-down approach B) bottom-up approach C) overview approach D) business approach
B) what you learned during requirements determination
The deliverables of process modeling state: A) how you should develop the system during physical design B) what you learned during requirements determination C) how you should implement the new system during implementation D) what you learned during project planning
Describe the environment
The design activity key question, "How will this system interact with other systems..." is part of which design activity?
Design the software classes
The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?
Design the software classes
The design activity key question, "What internal structure for each application component will ensure efficient construction..." is part of which design activity?
Why is the environment "DESCRIBED" while other key design elements such as the user interface and database are "designed"?
The designer of a single system has little or no control over the environment
Defined Processes
The development process is both implemented and understood. Measurements are taken, and the process is predictable enough to allow one to forecast the effect of implementing new technologies.
Short release
The development team compresses the time between releases of the product. Rather than release a full-blown version in a year, they will shorten the release time by tackling the most important features first, release that system or product, and then improve it later.
activity
The diagram model that is useful to document the flow of activities on a fully developed use case description is called a _______ diagram.
A) context diagram
The diagram that shows the scope of the system, indicating what elements are inside and which are outside the system, is called a: A) context diagram B) level-2 diagram C) referencing diagram D) representative diagram
Database design
The domain model is always used as an input to which design activity?
digital signature
The encoding of a message with a private key is called ____________________.
digital signature
The encoding of a message with a private key is called ____________________.
Probability
The expected relative frequency of a particular outcome Results of an experiment Cannot be less than zero or greater than one Always between 0 & 1
DFD Completeness
The extent to which all major components of a data-flow diagram have been included and fully described.
B) DFD completeness
The extent to which all necessary components of a data flow diagram have been included and fully described refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility
A) DFD consistency
The extent to which information contained on one level of a set of nested data flow diagrams is also included on other levels refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility
DFD consistency
The extent to which information contained on one level of a set of nested data-flow diagrams is also included on other levels.
package diagrams
The final step in the object-oriented design (OOD) process consists of developing the ____.
False
The first step in object-oriented design is to develop the design class diagram.
False
The first-cut DCD includes method signatures.
true/false condition
The following is the message syntax for an SSD. "[ _________ ] return-value := message-name (parameter-list)" What is missing?
Order is an object. anOrd is the reference to that object
The following notation "anOrd:Order" can be interpreted as follows:
whole-part
The general relationship between classes in which one class is a part or component of another class is called a _______ relationship.
object-oriented design
The general term that refers to the process to identify the set of classes, their methods and the messages to execute a use case is called ______ ______ ______.
Whether the transition fires.
The guard-condition on a transition indicates what?
Encapsulation
The idea that all data and methods are self-contained, as in a black box.
encapsulation
The idea that all data and methods are self-contained, as in a black box.
inheritance
The idea that the attributes of a superclass are also attributes of a subclass is called ______.
B) Your role is to find the best solution to a business problem or opportunity.
The impartiality characteristic of a good systems analyst is represented by which of the following statements? A) You must challenge yourself to look at the organization in new ways. B) Your role is to find the best solution to a business problem or opportunity. C) Assume anything is possible, and eliminate the infeasible. D) You should question everything.
D) You should question everything.
The impertinence characteristic of a good systems analyst is represented by which of the following statements? A) You must challenge yourself to look at the organization in new ways. B) Every fact must fit with every other fact. C) Assume anything is possible, and eliminate the infeasible. D) You should question everything.
business case
The justification for an information system, presented in terms of the tangible and intangible economic benefits and costs and the technical and organizational feasibility of the proposed system
True
The key question to answer with the design of the user interface activity is, "How will the users interact with the system?"
Users.
The key users of the system under consideration are vital participants in a JAD. They are the only ones who have a clear understanding of what it means to use the system on a daily basis.
Implementation
The last phase of the systems development life cycle, in which an analyst ensures that the system is in operation and then allows users to take over its operation and evaluation.
D) primitive data flow diagrams
The lowest level of DFDs is called: A) level-0 diagrams B) context diagrams C) level-1 diagrams D) primitive data flow diagrams
D) primitive diagram
The lowest level of decomposition for a data flow diagram is called the: A) context diagram B) level-0 diagram C) level-1 diagram D) primitive diagram
Primitive DFD
The lowest level of decomposition for a data-flow diagram
True
The majority of new systems today must be integrated into existing networks without disrupting existing applications.
Competitive Strategy
The method by which an organization attempts to achieve its mission and objectives
B) minimum cardinality of the relationship
The minimum number of instances of entity B that may be associated with each instance of entity A defines the: A) degree of the relationship B) minimum cardinality of the relationship C) maximum cardinality of the relationship D) domain of the relationship
B) Entity-relationship
The most common format used for data modeling is: A) state-transition diagramming B) entity-relationship diagramming C) process modeling D) decision table diagramming
network and computer operating systems
The most common security control points are _____________________ because they exercise direct control over such assets as fields, application programs, and disk drives.
transition
The movement of an object from one state to another is done through the process of a ___________.
False
The noun technique can be thought of as a variation of the brainstorming technique.
cardinality
The number of associations that occur among specific things in an entity relationship diagram is called ____.
A) cardinality
The number of instances of entity B that can (or must) be associated with each instance of entity A refers to: A) cardinality B) domain C) ternary occurrence D) participation level
build a new system
The objective of Implementation is to
True
The objective of design activities is to describe in detail the components of the final solution system that will serve as a blue print for construction.
Formal System
The official way a system works as described in an organization's documentation
A) formal system
The official way a system works as described in organizational documentation is referred to as a(n): A) formal system B) informal system C) official system D) desired system
Formal System
The official way a system works as described in organizational documentation.
Formal system
The official way a system works as described in organizational documentation. Informal system: the way the system actually works
False
The only difference between a domain class diagram and a design class diagram is the addition of the methods.
Systems analyst
The organizational role most responsible for the analysis and design of information systems. Primary role - study the problems and needs of an organization in order to determine how people, methods, and information technology can be best combined to bring improvements
A) source/sink
The origin and/or destination of data, sometimes referred to as external entities defines: A) source/sink B) data store C) data flow D) process
Source/sink
The origin and/or destination of data; sometimes referred to as external entities
True
The output of the design activities is a set of diagrams and documents that describe the solution system.
B) rules
The part of a decision table that links conditions to actions is the section that contains the: A) action statements B) rules C) condition statements D) decision stubs
B) condition stubs
The part of a decision table that lists the actions that result for a given set of conditions is called: A) action stubs B) condition stubs C) rule section D) condition execution
C) rules
The part of a decision table that specifies which actions are to be followed for a given set of conditions refers to: A) action stubs B) condition list C) rules D) decision list
issues related to technology are ignored
The perfect technology assumption implies that _______.
True
The perfect technology assumption means not to worry about issues such as user security.
Scribe
The person who makes detailed notes of the happenings at a Joint Application Design Session.
B) scribe
The person who makes detailed notes of the happenings at a Joint Application Design session is referred to as the: A) JAD analyst B) scribe C) JAD manager D) JAD session leader
Scribe:
The person who makes detailed notes of the happenings at a Joint Application Design session.
Scribe
The person who makes the detailed notes of the happenings at a Joint Application Design session
true/false condition
The portion of a message syntax that is contained within square brackets is called the ____ _____ ______.
B) E-R diagram
The primary deliverable from the conceptual modeling step within the analysis phase is a(n): A) state-transition diagram B) E-R diagram C) context data flow diagram D) decision tree
D) all of the above
The primary deliverables from requirements determination include: A) sets of forms, reports, and job descriptions B) transcripts of interviews C) notes from observation and from analysis documents D) all of the above
True
The primary difference between a design class symbol and a problem domain class symbol is the addition of method signatures.
design class and interaction
The primary models used for OO detailed design are ____ diagrams.
False
The primary purpose of integrity controls is to track external activity.
D) gap analysis
The process in analysis in which the analyst tries to discover discrepancies between two or more sets of data flow diagrams, representing two or more states of an information system, or discrepancies within a single DFD, is referred to as: A) double checking B) sequencing C) referencing D) gap analysis
Affinity Clustering
The process of arranging planning a matrix information so that clusters of information with a predetermined level or type of affinity are placed next to each other on a matrix report
legal and contractual feasibility
The process of assessing potential legal and contractual ramifications due to the construction of a system
Operational feasibility
The process of assessing the degree to which a proposed system solves business problems or takes advantage of business opportunity
Schedule feasibility
The process of assessing the degree to which the potential time frame and completion dates for all major activities within a project meet organizational deadlines and constraints for affecting change
Decryption
The process of converting encrypted data back to their original state
Gap Analysis
The process of discovering discrepancies between two or more sets of data-flow diagrams or discrepancies within a single DFD
Political feasibilty
The process of evaluating how key stakeholders within the organization view the proposed system
Authentication
The process off identifying users who request access to sensitive resources
False
The project plan is required to get the project approved.
Discount rate
The rate of return used to compute the present value of future cash flows
interaction
The realization of a use case-determining what objects collaborate by sending messages to each other to carry out the use case-is done through the development of a ____ diagram.
A) You must challenge yourself to look at the organization in new ways.
The reframing characteristic of a good systems analyst is represented by which of the following statements? A) You must challenge yourself to look at the organization in new ways. B) Every fact must fit with every other fact. C) Assume anything is possible, and eliminate the infeasible. D) You should question everything
Business Process Re-engineering
The search for and implementation of, radical change in business processes to achieve breakthrough improvements in products and services
Business process reengineering (BPR)
The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services
D) business process reengineering
The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services best defines: A) Joint Application Design B) Rapid Application Development C) structured programming D) business process reengineering
Business Process Reengineering (BPR)
The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services.
C) domain
The set of all data types and ranges of values that an attribute can assume defines: A) cardinality B) constraint set C) domain D) reference set
problem domain
The specific area of the user's business need that is within the scope of the new system is called the _______.
Key business processes
The structured, measured set of activities designed to produce a specific output for a particular customer or market
B) key business processes
The structured, measured set of activities designed to produce a specific output for a particular customer or market best defines: A) formal systems B) key business processes C) secondary activities D) production systems
Key Business Processes
The structured, measured set of activities designed to produce a specific output for a particular customer or market.
Key business processes
The structured, measured set of activities designed to produce a specific output for a particular customer or market.
D) a rectangle with rounded edges
The symbol for an activity is: A) a square B) a circle C) an arrow D) a rectangle with rounded edges
synchronization bar
The symbol that is used to initiate concurrent paths in a state machine diagram is what?
noun technique
The technique for finding problem domain objects by finding and listing all the nouns in a dialog or description is called the _______.
navigation visibility
The term "______ ______" is a design principle in which one object has reference to another object and can thus interact with it.
cohesion
The term "_______" is a measure of the focus or unity of purpose within a single class.
class-level attribute
The term used to identify an attribute that contains the same value for all objects of this type in the system is _______.
B) analysis paralysis
The term used to refer to systems development projects bogged down in an abundance of analysis work is: A) information overload B) analysis paralysis C) analysis overload D) information abundance
B) data flows
The three main constructs of the entity-relationship modeling notation include each of the following except: A) data entities B) data flows C) relationships D) attributes
SDLC
The traditional methodology used to develop, maintain, and replace information systems
JAD session leader
The trained individual who plans and leads JAD sessions
JAD Session Leader
The trained individual who plans and leads Joint Application Design Sessions.
B) JAD session leader
The trained individual who plans and leads Joint Application Design sessions is referred to as the: A) scribe B) JAD session leader C) JAD manager D) JAD contributor
JAD session leader
The trained individual who plans and leads Joint Application Design sessions.
D) all of the above
The typical participants in a JAD include: A) a session leader B) a scribe C) a sponsor D) all of the above
Electronic data interchange
The use of telecommunications technologies to directly transfer business documents between organizations
Informal system
The way a system actually works
B) informal system
The way a system actually works is referred to as a(n): A) unofficial system B) informal system C) actual system D) formal system
Informal System
The way a system actually works.
Process
The work or actions performed on data so that they are transformed, stored, or distributed
D) process
The work or actions performed on data so that they are transformed, stored, or distributed defines: A) source/sink B) data store C) data flow D) process
Ad Hoc processes
There is no development methodology, and few, if any, controls are in place. Progress, even if attainable, may not be recognized because of lack of measurement.
40-hour workweek
This core practice attempts to motivate team members to work intensely at the job, and then to take time off so that when they return they are relaxed and less stressed; reinforces the idea that working overtime for more than a week in a row is very bad for the health of the project and the developers.
unauthorized user, registered user, and privileged user
Three types of users that are considered in the design of a security system are ____.
unauthorized user, registered user, and privileged user
Three types of users that are considered in the design of a security system are ____.
D) multiply the number of values for each condition by the number of values for every other condition
To determine the number of rules required for the decision table, you would: A) add the number of values for each condition to the number of values for every other condition B) multiply the number of conditions by two C) add the number of values for each condition to the number of values for every other condition, then subtract 1 D) multiply the number of values for each condition by the number of values for every other condition
opt frame
To show a set of messages that may be optional a __________ is used.
alt frame
To show if-then-else condition on a sequence diagram use a ______.
User stories
Tool used in Agile software development to capture a description of a software feature from an end-user perspective. The user story describes the type of user, what they want and why. A user story helps to create a simplified description of a requirement.
D) all of the above
Traditional methods of collecting systems requirements include: A) individual interviews B) observing workers C) group interviews D) all of the above
A file contains an electronic list of information that is formatted for a particular transaction, and the information is changed and manipulated by programs that are written for those purposes.
True
An audit file contains information about how data changes over time; it records before and after images of data as it is altered so that it can be validated later.
True
Key-value data stores is a type of NOSQL data stores, and they essentially provide a distributed index (primary key) to where a BLOB (binary, large object) is stored.
True
Sequential access files are very efficient for operations such as report writing.
True
The Relational DBMS only supports simple data types, but the Object Relational DBMS supports both simple and complex data types.
True
The most efficient tables in a relational database in terms of storage space have no redundant data and very few null values because the presence of these suggest that space is being wasted, and more data to store means higher data storage hardware costs.
True
The normalization process is performed primarily to increase the database's storage efficiency.
True
The process of adding redundancy back into a physical data model is known as denormalization.
True
Update anomalies occur when some instances of redundantly stored data are overlooked when an update occurs.
True
False
Two difference scenarios of a use case would normally be described in a single fully developed use case description.
Asterisk *, Loop frame
Two methods to show a repeating message are: (Choose two)
Dashed arrow with value,value :=
Two methods to show a return value are: (Choose two)
False
Two techniques to identify things in the problem domain are the noun technique and the verb technique.
____ is a widely used method of visualizing and documenting an information system.
UML
stereotyping
UML provides a technique to extend the standard UML notation to include new symbols. This technique is called ________.
scenario
Use cases may have different "paths" or sequence of steps through the use case. These different paths are called _______.
Requirements planning phase
Useful in determining scope and assigning resources: Time, Cost, Quality.
True
User interface design requires both analysis and design.
view or boundary
User interface objects in a sequence diagram often are labeled with the stereotype ____.
verifying who sent a document
Using digital signatures is primarily a technique to ____.
verifying who sent a document
Using digital signatures is primarily a technique to ____.
lifeline
Vertical dashed lines on a system sequence diagram are used to depict a what?
create problem domain classes
View layer classes should do all of the following EXCEPT _______.
False
Visibility is a design property that indicates whether a class can be "seen" by the user interface classes.
(Design Activities: Key Question) Design the application components
What are the key parts of the information system and how will they interact when the system is deployed?
Key Question for: Design the application components
What are the key parts of the information system and how will they interact when the system is deployed?
External systems and technology architecture
What are two key elements of describing the environment?
method signature
What do we call the notation that shows all the information required to call or invoke a method?
(Design Activities: Key Question) Design the software classes and methods
What internal structure for each application component will ensure efficient construction, rapid deployment, and reliable operation?
Key question for: Design the software classes and methods
What internal structure for each application component will ensure efficient construction, rapid deployment, and reliable operation?
Value limit control
What is a control that checks the value of a field to ensure that it is within the correct range?
Replace the :System object with all the objects that must collaborate
What is the first step in constructing a first-cut sequence diagram from the elements of the system sequence diagram (SSD)?
Define a single controller for all use cases.
What is the least cohesive approach in creating use case controllers in a system?
Data validation control
What is the name of a general control technique used to ensure that entered data is correct?
Completeness control
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
Completeness control
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
To validate the set of defined use cases
What is the primary purpose of the CRUD technique?
use case realization
What is the process of detail design for a particular use case by elaborating the messages that are necessary to execute the use case?
Protection from variations
What is the term that is used to describe a design principle in which parts of a system that are unlikely to change are segregated from those that will?
class-level method
What is the term to denote a method that is invoked on a class instead of on an object?
visibility
What is the term used to define the characteristic of an object attribute that describes whether it can be directly accessed by another object -- denoted by + or - ?
Expected relative frequency
What you expect to get in the long run if you repeated the experiment many times Flipped a coin eventually you would have half and half
factory
When a domain object needs to create a utility object, such as a data access object, it often will use a design pattern called the _______ pattern.
a method is being invoked on the destination object
When a message is sent from an originating object to a destination object it means that ______.
begins the process to initialize the necessary data access objects in memory
When a use case controller receives the initial request for an inquiry when the data access layer is added, it first ____.
destination state
When an object moves from one state to another the ending state is a called a __________.
Is it a synonym of an existing thing? Is it an output from the system?
When analyzing the list of nouns to determine whether to EXCLUDE a particular noun as an important "thing," which of the following questions should be asked about the noun? (choose two)
Is it unique? Are there multiple instances of it?
When analyzing the list of nouns to determine whether to INCLUDE a particular noun as an important "thing," which of the following questions should be asked about the noun?
C) the potential audience of the observation method is limited
When comparing observations and document analysis: A) the time required to conduct observations compared to document analysis is low B) the observee is not known to the interviewer C) the potential audience of the observation method is limited D) with document analysis, a clear commitment is discernible
D) limited entry
When condition values are either "yes" or "no", these values are called a(n): A) extended entry B) simple entry C) complex entry D) limited entry
Programming languages
When describing the interfaces to external systems, which is not one of the important issues?
Programming languages
When describing the interfaces to external systems, which is not one of the important issues?
False
When identifying things in the problem domain, an analyst should focus primarily on tangible things about which information is required.
On a project that uses iterations to develop the system, in which iteration does system design begin?
When iterative approach of SLDC is used, major design decisions are made in the first or second iteration; however, many decisions are revisited and refined during later iterations
Should it be researched further?
When making a list of nouns to determine what are the important "things" for the new system, there are three question that should be asked about each noun. Which of the following is one of those questions?
C) choose a candidate key that will not change its value over the life of each instance of the entity type
When selecting an identifier, one should: A) use intelligent keys B) use large composite keys instead of single-attribute surrogate keys C) choose a candidate key that will not change its value over the life of each instance of the entity type D) choose a candidate key such that for each instance of the entity, the attribute is guaranteed to have valid values or is null
private
When the data is encrypted with the public key in asymmetric encryption, it is decrypted with a ____ key.
True
When using the brainstorming technique it is often helpful to think about each use case and talking to users.
True
When using the noun technique, the analyst begins by listing all the nouns that the users mention.
camelcase
When words are concatenated together to form a single word and the first letter of each is capitalized it is called _______ notation.
C) primitive data flow diagrams
When you believe that you have shown each business form or transaction, computer screen, and report as a single data flow, you have probably reached the: A) level-0 diagrams B) level-1 diagrams C) primitive data flow diagrams D) level-3 diagrams
Security and controls design
Which design activity that pervades all other design activities?
Security and controls design
Which design activity that pervades all other design activities?
Interaction diagram
Which design model provides information for a design class diagram?
Ensure a stable functioning operating environment
Which is NOT an objective of integrity controls?
* [true/false]RetVal := name (param)
Which is the correct notation for a message label on a sequence diagram?
Class Diagram
Which model is most useful in developing a State Machine Diagram
A) referential integrity constraints
Which of the following addresses the rules concerning the relationships between entity types? A) referential integrity constraints B) triggering operations C) entity integrity D) domains
Attributes, Responsibilities
Which of the following are information items on CRC cards. (Choose two)
System programmers, application programmers, and system administrators
Which of the following can be classified as privileged users?
System programmers, application programmers, and system administrators
Which of the following can be classified as privileged users?
Description of when the pattern does not apply
Which of the following is NOT a component of the design pattern template?
Authorization of users
Which of the following is NOT a factor that affects the risk of fraud?
Authorization of users
Which of the following is NOT a factor that affects the risk of fraud?
Expand the name of each state to identify concurrent activities.
Which of the following is NOT a step in the development of a state machine diagram?
Relationship line
Which of the following is NOT a valid construct as part of an activity diagram?
A return condition name
Which of the following is NOT a valid technique to return data from an input message?
developing new models allows the analyst to discard unnecessary diagrams.
Which of the following is NOT an advantage of object-oriented modeling with several models is that _____.
trigger
Which of the following is NOT an element in a transition label?
Activity diagram
Which of the following is NOT considered a design model?
D) Scheduling group interviews can be a problem.
Which of the following is a disadvantage to group interviewing? A) Group interviewing does not effectively utilize your time. B) Interviewing several people together allows them to hear the opinions of other key people. C) Group interviewing requires significantly more time than does the JAD process. D) Scheduling group interviews can be a problem.
A superior/subordinate relationship is usually navigated from the superior to the subordinate class
Which of the following is a general guideline for designing navigation visibility?
C) People often do not have a completely accurate appreciation of what they do or how they do it.
Which of the following is a reason for directly observing end users? A) The analyst gets a snap-shot image of the person or task being observed. B) Observations are not very time consuming. C) People often do not have a completely accurate appreciation of what they do or how they do it. D) Employees will alter their performance if they know that they are being observed.
B) Group interviews
Which of the following is a traditional method of collecting systems requirements? A) Group support systems B) Group interviews C) Joint Application Design D) Rapid Application Development
A) The primary purpose of using JAD in the analysis phase is to collect systems requirements simultaneously from the key people involved with the system.
Which of the following is a true statement regarding JAD? A) The primary purpose of using JAD in the analysis phase is to collect systems requirements simultaneously from the key people involved with the system. B) JAD follows a particular structure of roles and agenda that are similar to the group interview. C) JAD sessions are usually conducted in the organization's conference room. D) A JAD session is inexpensive to conduct
C) A data store has a noun phrase label.
Which of the following is a true statement regarding a data store? A) Data can move directly from one data store to another data store. B) Data can move directly from a sink to a data store. C) A data store has a noun phrase label. D) Data can move from an outside source to a data store.
D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.
Which of the following is a true statement regarding data flows? A) A data flow may have multiple directions between symbols. B) A data flow to a data store means retrieve or use. C) A data flow from a data store means update. D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.
D) All of the above.
Which of the following is a true statement regarding sources/sinks? A) Sources/sinks are always outside the information system and define the boundaries of the system. B) Data must originate outside a system from one or more sources. C) The system must produce information to one or more sinks. D) All of the above.
C) An information system design based on a data orientation, rather than a process or logic orientation, should have a longer useful life.
Which of the following is a true statement? A) Data characteristics are dynamic. B) A data model explains the transient form of an organization. C) An information system design based on a data orientation, rather than a process or logic orientation, should have a longer useful life. D) Data flow paths are permanent.
A) Interviews based on closed-ended questions do not necessarily require a large time commitment, so more topics can be covered.
Which of the following is an advantage of closed-ended questions? A) Interviews based on closed-ended questions do not necessarily require a large time commitment, so more topics can be covered. B) Closed-ended questions enable the analysts to explore information that does not quite fit defined answers. C) The analyst can obtain previously unknown information. D) Closed-ended questions often put the interviewee at ease
Communication diagram
Which of the following is an example of an interaction diagram?
D) none of the above
Which of the following is considered when diagramming? A) the interactions occurring between sources and sinks B) how to provide sources and sinks direct access to stored data C) how to control or redesign a source or sink D) none of the above
Stereotype name
Which of the following is included in the top compartment of a design class?
A) interviewing
Which of the following is not a contemporary method for determining system requirements? A) interviewing B) group support systems C) CASE tools D) Joint Application Design
D) Test each program module separately from every other program module, and then perform system testing.
Which of the following is not a step in the Agile Usage-Centered Design Method? A) Give everyone a chance to vent about the current system and to talk about the features every one wants in the new system. B) Determine what the most important user roles would be. C) Determine what tasks user roles will have to complete in order to achieve their goals. D) Test each program module separately from every other program module, and then perform system testing.
B) A data flow can go directly back to the same process it leaves.
Which of the following is not a true statement regarding data flows? A) A fork in a data flow means that exactly the same data goes from a common location to two or more different processes, data stores, or sources/sinks. B) A data flow can go directly back to the same process it leaves. C) A data flow has a noun phrase label. D) A data flow has only one direction of flow between symbols.
B) JAD
Which of the following is not an Agile Methodologies requirements determination technique? A) Planning Game B) JAD C) Agile Usage-Centered Design D) continual user involvement
C) Composite data flows on one level cannot be split into component data flows at the next level.
Which of the following is not an advanced rule governing data flow diagramming? A) To avoid having data flow lines cross each other, data stores may be repeated on a DFD. B) At the lowest level of DFDs, new data flows may be added to represent data that are transmitted under exceptional conditions. C) Composite data flows on one level cannot be split into component data flows at the next level. D) The inputs to a process must be sufficient to produce the outputs from the process.
Design the security controls
Which of the following is not one of the design activities included in the Design System Components core process?
D) state-transition diagram
Which of the following is not one of the primary deliverables resulting from studying and documenting a system's processes? A) context data flow diagram (DFD) B) thorough descriptions of each DFD component C) DFDs of the current logical system D) state-transition diagram
The input window is coupled to the domain and the domain is coupled to the database.
Which of the following is the best coupling choice for an input window, domain, and database object in a system?
System Sequence Diagrams
Which of the following is the best model to use to document the inputs and the outputs to a system?
D) steering
Which of the following is the eXtreme Programming Planning Game phase where Business has a chance to see how the development process is progressing and to work with Development to adjust the plan accordingly? A) commitment B) exploration C) choice D) steering
They are executed by the class instead of a specific object of the class.
Which of the following is true of class-level methods?
Method signatures
Which of the following is usually NOT included in a first-cut design class diagram?
visibility name(parameter list):type-expression
Which of the following is valid Unified Modeling Language (UML) notation for a method signature?
User interface design
Which of the following really is both an analysis (discovery) and a design process (solution).
B) triggering operations
Which of the following refers to an assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete? A) referential integrity constraints B) triggering operations C) entity integrity D) domains
D) domains
Which of the following refers to the set of all data types and values that an attribute can assume? A) referential integrity constraints B) triggering operations C) entity integrity D) domains
D) overlap rule
Which of the following specifies that an entity instance can simultaneously be a member of two (or more) subtypes? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule
B) partial specialization rule
Which of the following specifies that an entity instance of the supertype is allowed not to belong to any subtype? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule
A) total specialization rule
Which of the following specifies that each entity instance of the supertype must be a member of some subtype in the relationship? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule
C) entity integrity
Which of the following specifies that each instance of an entity type must have a unique identifier that is not null? A) referential integrity constraints B) triggering operations C) entity integrity D) domains
C) disjoint rule
Which of the following specifies that if an entity instance of the supertype is a member of one subtype it cannot simultaneously be a member of any other subtype? A) total specialization rule B) partial specialization rule C) disjoint rule D) overlap rule
B) distributed databases
Which of the following technologies disrupted the business rule that information can appear only in one place at a time? A) high-performance computing B) distributed databases C) expert systems D) advanced telecommunications networks
A) eXtreme programming
Which of the following was developed by Kent Beck, and is distinguished by its short cycles, its incremental planning approach, its focus on automated tests written by programmers and customers to monitor the process of development, and its reliance on an evolutionary approach to development that lasts throughout the lifetime of the system? A) eXtreme programming B) evolutionary prototyping C) rapid application development D) object-oriented analysis and design
Registered user
Which user is known to the system and is authorized to access all or certain parts of it?
Registered user
Which user is known to the system and is authorized to access all or certain parts of it?
Certifying Authorities
Widely accepted issuers of digital certificates
Package
____ diagrams partition a design class diagram into related functions.
cohesion
____ is a qualitative measure of the consistency of functions within a single class.
Unary association
____ is used to describe the relationship between two things of the same type, such as one person being married to another person.
Generalization/Specialization
_____ is based on the idea that people classify things in terms of similarities and differences.
Authorization
_______ is the process of allowing or restricting a specific user's access to specific resources.
Authorization
_______ is the process of allowing or restricting a specific user's access to specific resources.
Multiplicity Constraints
_______ is used to describe the actual range of linkups allowed in an association (the minimum and maximum values).
Authentication
____________________ is the process of identifying a user to verify that he or she can have access to the system.
Authentication
____________________ is the process of identifying a user to verify that he or she can have access to the system.
encryption key
a binary input to the encryption algorithm - typically a long string of bits
three-layer architecture
a client/server architecture that divides an application into view layer, business logic layer, and data layer
Virtual Private Networks (VPNs)
a closed network with security and closed access built on top of a public network, such as the Internet
Agile Modeling
a collection of innovative, user-centered approaches to system development.
encryption algorithm
a complex mathematical transformation that encrypts or decrypts binary data
client-server architecture
a computer network configuration with user's computers and central computers that provide common services
local area network (LAN)
a computer network in which the cabling and hardware are confined to a single location
access control
a control that limits a users ability to access resources, such as servers, files, web pages, application programs, and database tables.
Project Management
a controlled process that involves the 4 phases of initiating, planning, executing, and closing down a project
Smart Card
a device that is around the same size as a credit card, containing embedded technology that can store information and small amounts of software to perform some limited processing
Network Diagram
a diagram that depicts project tasks and interrelationships. The ordering of tasks is shown by connecting tasks
Request for Proposal
a document provided to vendors that asks them to prepare hardware and system software that will meet the requirements of a new system - a way to collect more information about system software, its performance, and its cost
public key encryption
a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption
Gantt Chart
a graphical representation of a project that shows each task as a horizontal bar whose length is proportional to its time for completion
colocation
a hosting service with a secure location but in which the computers are usually owned by the client businesses
access control list
a list attached or linked to a specific resource that describes users or user groups and the nature of permitted access
Object class
a logical grouping of objects that have the same (or similar) attributes and behaviors (methods)
virtual server
a method to partition the services of a physical Web server so it appears as multiple, independent Internet servers
fraud triangle
a model of fraud that states that opportunity, motivation, and rationalization must all exist for a fraud to occur
network diagram
a model that shows how the application is deployed across networks and computers
Nonoperational Scale Models
a nonworking scale model that is set up to test certain aspects of the design; produced when the coding required by the application is too expensive to prototype but when a useful idea of the system can be gained through prototyping of the input and output only.
Project
a planned undertaking of related activities to reach an objective that has a beginning and an end
Critical Path Scheduling
a scheduling technique whose order and duration of a sequence of task activities directly affect the completion date of a project, example: network diagramming
remote wipe
a security measure that automatically deletes sensitive data from a portable device when unauthorized accesses are attempted
content delivery network (CDN)
a set of server computers, separate from the hosting computers, used to deliver such static content as images or videos
Project Charter
a short document prepared for the customer during the project initiation that describes what the project will deliver and outlines generally at a high level all work required to complete the project
Secure Sockets Layer (SSL)
a standard set of methods and protocols that address authentication, authorization, privacy, and integrity
Feasibility Study
a study that determines if the proposed information system makes sense for the organization from an economic and operational standpoint
Enterprise Resource Planning
a system that integrates individual traditional business functions into a series of modules so that a single transaction occurs seamlessly within a single information system rather than several separate systems
Patched-Up Prototype
a system that works but is patched up or patched together; a working model that has all the features but is inefficient. - users can interact with the system - retrieval/storage of info. may be inefficient
Project Manager
a systems analyst with a diverse set of skills: management, leadership, technical, conflict management, and customer relationship - who is responsible for initiating, planning, executing, and closing down a project
digital signiture
a technique in which a document is encrypted by using a private key to verify who wrote the document
Program Evaluation Review Technique (PERT)
a technique that uses optimistic, pessimistic, and realistic time estimates to calculate the expected time for a particular task
application component
a well-defined unit of software that performs one or more specific tasks
Direct approach
abandon old system and start up new system
Phase 4: Systems Development
acquire software, acquire hardware, test the new system